Skip to main content
Top
Published in: Business & Information Systems Engineering 4/2023

10-03-2023 | State of the Art

A Systematic Review of Anomaly Detection for Business Process Event Logs

Authors: Jonghyeon Ko, Marco Comuzzi

Published in: Business & Information Systems Engineering | Issue 4/2023

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

While a business process is most often executed following a normal path, anomalies may sometimes arise and can be captured in event logs. Event log anomalies stem, for instance, from system malfunctioning or unexpected behavior of human resources involved in a process. To identify and possibly fix these, anomaly detection has emerged recently as a key discipline in process mining. In the paper, the authors present a systematic review of the literature on business process event log anomaly detection. The review aims at selecting systematically studies in the literature that have tackled the issue of event log anomaly detection, classifying existing approaches based on criteria emerging from previous literature reviews, and identifying those research directions in this field that have not been explored extensively. Based on the results of the review, the authors argue that future research should look more specifically into anomaly detection on event streams, extending the number of event log attributes considered to determine anomalies, and producing more standard labeled datasets to benchmark the techniques proposed.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Show more products
Appendix
Available only for authorised users
Literature
go back to reference Aggarwal CC (2017) An introduction to outlier analysis. In: Aggarwal CC (ed) Outlier analysis. Springer, Heidelberg, pp 1–34CrossRef Aggarwal CC (2017) An introduction to outlier analysis. In: Aggarwal CC (ed) Outlier analysis. Springer, Heidelberg, pp 1–34CrossRef
go back to reference Andrews R, Wynn MT, Vallmuur K, Ter Hofstede AH, Bosley E, Elcock M, Rashford S (2019) Leveraging data quality to better prepare for process mining: an approach illustrated through analysing road trauma pre-hospital retrieval and transport processes in queensland. Int J Environ Res Pub Health 16(7):1138CrossRef Andrews R, Wynn MT, Vallmuur K, Ter Hofstede AH, Bosley E, Elcock M, Rashford S (2019) Leveraging data quality to better prepare for process mining: an approach illustrated through analysing road trauma pre-hospital retrieval and transport processes in queensland. Int J Environ Res Pub Health 16(7):1138CrossRef
go back to reference Bao L, Li Q, Lu P, Lu J, Ruan T, Zhang K (2018) Execution anomaly detection in large-scale systems through console log analysis. J Syst Softw 143:172–186CrossRef Bao L, Li Q, Lu P, Lu J, Ruan T, Zhang K (2018) Execution anomaly detection in large-scale systems through console log analysis. J Syst Softw 143:172–186CrossRef
go back to reference Bezerra F, Wainer J (2011) Fraud detection in process aware systems. Int J Bus Process Integ Manag 5(2):121–129CrossRef Bezerra F, Wainer J (2011) Fraud detection in process aware systems. Int J Bus Process Integ Manag 5(2):121–129CrossRef
go back to reference Bezerra F, Wainer J (2013) Algorithms for anomaly detection of traces in logs of process aware information systems. Inf Syst 38(1):33–44CrossRef Bezerra F, Wainer J (2013) Algorithms for anomaly detection of traces in logs of process aware information systems. Inf Syst 38(1):33–44CrossRef
go back to reference Bezerra F, Wainer J, van der Aalst WMP (2009) Anomaly detection using process mining. Enterprise, business-process and information systems modeling. Springer, Heidelberg, pp 149–161CrossRef Bezerra F, Wainer J, van der Aalst WMP (2009) Anomaly detection using process mining. Enterprise, business-process and information systems modeling. Springer, Heidelberg, pp 149–161CrossRef
go back to reference Böhmer K, Rinderle-Ma S (2016) Multi-perspective anomaly detection in business process execution events. Otm confederated international conferences on the move to meaningful internet systems. Springer, Heidelberg, pp 80–98 Böhmer K, Rinderle-Ma S (2016) Multi-perspective anomaly detection in business process execution events. Otm confederated international conferences on the move to meaningful internet systems. Springer, Heidelberg, pp 80–98
go back to reference Böhmer K, Rinderle-Ma S (2017) Anomaly detection in business process runtime behavior–challenges and limitations. arXiv preprint arXiv:1705.06659 Böhmer K, Rinderle-Ma S (2017) Anomaly detection in business process runtime behavior–challenges and limitations. arXiv preprint arXiv:​1705.​06659
go back to reference Böhmer K, Rinderle-Ma S (2020) Mining association rules for anomaly detection in dynamic process runtime behavior and explaining the root cause to users. Inf Syst 90(101):438 Böhmer K, Rinderle-Ma S (2020) Mining association rules for anomaly detection in dynamic process runtime behavior and explaining the root cause to users. Inf Syst 90(101):438
go back to reference Boldt M, Borg A, Ickin S, Gustafsson J (2020) Anomaly detection of event sequences using multiple temporal resolutions and markov chains. Knowl Inf Syst 62(2):669–686CrossRef Boldt M, Borg A, Ickin S, Gustafsson J (2020) Anomaly detection of event sequences using multiple temporal resolutions and markov chains. Knowl Inf Syst 62(2):669–686CrossRef
go back to reference Burattin A, Carmona J (2017) A framework for online conformance checking. International conference on business process management. Springer, Heidelberg, pp 165–177 Burattin A, Carmona J (2017) A framework for online conformance checking. International conference on business process management. Springer, Heidelberg, pp 165–177
go back to reference Carmona J, van Dongen B, Solti A, Weidlich M (2018) Conformance checking. Springer, HeidelbergCrossRef Carmona J, van Dongen B, Solti A, Weidlich M (2018) Conformance checking. Springer, HeidelbergCrossRef
go back to reference Chandola V, Banerjee A, Kumar V (2010) Anomaly detection for discrete sequences: a survey. IEEE Transact Knowld Data Eng 24(5):823–839CrossRef Chandola V, Banerjee A, Kumar V (2010) Anomaly detection for discrete sequences: a survey. IEEE Transact Knowld Data Eng 24(5):823–839CrossRef
go back to reference Choi S, Youm S, Kang YS (2019) Development of scalable on-line anomaly detection system for autonomous and adaptive manufacturing processes. Appl Sci 9(21):4502CrossRef Choi S, Youm S, Kang YS (2019) Development of scalable on-line anomaly detection system for autonomous and adaptive manufacturing processes. Appl Sci 9(21):4502CrossRef
go back to reference Cuzzocrea A, Folino F, Guarascio M, Pontieri L (2018) Deviance-aware discovery of high-quality process models. Int J Artific Intell Tool 27(07):1860009CrossRef Cuzzocrea A, Folino F, Guarascio M, Pontieri L (2018) Deviance-aware discovery of high-quality process models. Int J Artific Intell Tool 27(07):1860009CrossRef
go back to reference da Silva CE, da Silva JDS, Paterson C, Calinescu R (2017) Self-adaptive role-based access control for business processes. In: 2017 IEEE/ACM 12th international symposium on software engineering for adaptive and self-managing systems (SEAMS). IEEE, pp 193–203 da Silva CE, da Silva JDS, Paterson C, Calinescu R (2017) Self-adaptive role-based access control for business processes. In: 2017 IEEE/ACM 12th international symposium on software engineering for adaptive and self-managing systems (SEAMS). IEEE, pp 193–203
go back to reference Di Francescomarino C, Ghidini C, Maggi FM, Milani F (2018) Predictive process monitoring methods: Which one suits me best? International conference on business process management. Springer, Heidelberg, pp 462–479CrossRef Di Francescomarino C, Ghidini C, Maggi FM, Milani F (2018) Predictive process monitoring methods: Which one suits me best? International conference on business process management. Springer, Heidelberg, pp 462–479CrossRef
go back to reference van Dongen BF, Carmona J, Chatain T (2016) A unified approach for measuring precision and generalization based on anti-alignments. International conference on business process management. Springer, Heidelberg, pp 39–56CrossRef van Dongen BF, Carmona J, Chatain T (2016) A unified approach for measuring precision and generalization based on anti-alignments. International conference on business process management. Springer, Heidelberg, pp 39–56CrossRef
go back to reference Dumas M, La Rosa M, Mendling J, Reijers HA et al (2013) Fundamentals of business process management, vol 1. Springer, HeidelbergCrossRef Dumas M, La Rosa M, Mendling J, Reijers HA et al (2013) Fundamentals of business process management, vol 1. Springer, HeidelbergCrossRef
go back to reference Flach P (2012) Machine learning: the art and science of algorithms that make sense of data. Cambridge University Press, CambridgeCrossRef Flach P (2012) Machine learning: the art and science of algorithms that make sense of data. Cambridge University Press, CambridgeCrossRef
go back to reference Folino F, Greco G, Guzzo A, Pontieri L (2011) Mining usage scenarios in business processes: Outlier-aware discovery and run-time prediction. Data Knowl Eng 70(12):1005–1029CrossRef Folino F, Greco G, Guzzo A, Pontieri L (2011) Mining usage scenarios in business processes: Outlier-aware discovery and run-time prediction. Data Knowl Eng 70(12):1005–1029CrossRef
go back to reference Galanti R, Coma-Puig B, de Leoni M, Carmona J, Navarin N (2020) Explainable predictive process monitoring. In: 2020 2nd international conference on process mining (ICPM). IEEE, pp 1–8 Galanti R, Coma-Puig B, de Leoni M, Carmona J, Navarin N (2020) Explainable predictive process monitoring. In: 2020 2nd international conference on process mining (ICPM). IEEE, pp 1–8
go back to reference Ghosh AK, Schwartzbard A (2000) Analyzing the performance of program behavior profiling for intrusion detection. Research advances in database and information systems security. Springer, Heidelberg, pp 19–32CrossRef Ghosh AK, Schwartzbard A (2000) Analyzing the performance of program behavior profiling for intrusion detection. Research advances in database and information systems security. Springer, Heidelberg, pp 19–32CrossRef
go back to reference Gupta N, Anand K, Sureka A (2015) Pariket: mining business process logs for root cause analysis of anomalous incidents. International workshop on databases in networked information systems. Springer, Heidelberg, pp 244–263 Gupta N, Anand K, Sureka A (2015) Pariket: mining business process logs for root cause analysis of anomalous incidents. International workshop on databases in networked information systems. Springer, Heidelberg, pp 244–263
go back to reference Han J, Pei J, Mortazavi-Asl B, Pinto H, Chen Q, Dayal U, Hsu M (2001) Prefixspan: mining sequential patterns efficiently by prefix-projected pattern growth. In: Proceedings of the 17th international conference on data engineering. Citeseer, pp 215–224 Han J, Pei J, Mortazavi-Asl B, Pinto H, Chen Q, Dayal U, Hsu M (2001) Prefixspan: mining sequential patterns efficiently by prefix-projected pattern growth. In: Proceedings of the 17th international conference on data engineering. Citeseer, pp 215–224
go back to reference Harl M, Weinzierl S, Stierle M, Matzner M (2020) Explainable predictive business process monitoring using gated graph neural networks. J Decis Syst 29(sup1):312–327CrossRef Harl M, Weinzierl S, Stierle M, Matzner M (2020) Explainable predictive business process monitoring using gated graph neural networks. J Decis Syst 29(sup1):312–327CrossRef
go back to reference Hodge V, Austin J (2004) A survey of outlier detection methodologies. Artific Intell Rev 22(2):85–126CrossRef Hodge V, Austin J (2004) A survey of outlier detection methodologies. Artific Intell Rev 22(2):85–126CrossRef
go back to reference Huang Z, Dong W, Ji L, Yin L, Duan H (2015) On local anomaly detection and analysis for clinical pathways. Artific Intell Med 65(3):167–177CrossRef Huang Z, Dong W, Ji L, Yin L, Duan H (2015) On local anomaly detection and analysis for clinical pathways. Artific Intell Med 65(3):167–177CrossRef
go back to reference Huda S, Sarno R, Ahmad T (2016) Increasing accuracy of process-based fraud detection using a behavior model. Int J Softw Eng Appl 10(5):175–188 Huda S, Sarno R, Ahmad T (2016) Increasing accuracy of process-based fraud detection using a behavior model. Int J Softw Eng Appl 10(5):175–188
go back to reference Huynh VH, Le AN (2012) Process mining and security: visualization in database intrusion detection. Pacific-Asia workshop on intelligence and security informatics. Springer, Heidelberg, pp 81–95CrossRef Huynh VH, Le AN (2012) Process mining and security: visualization in database intrusion detection. Pacific-Asia workshop on intelligence and security informatics. Springer, Heidelberg, pp 81–95CrossRef
go back to reference Junior SB, Ceravolo P, Damiani E, Omori NJ, Tavares GM (2020) Anomaly detection on event logs with a scarcity of labels. In: 2020 2nd international conference on process mining (ICPM). IEEE, pp 161–168 Junior SB, Ceravolo P, Damiani E, Omori NJ, Tavares GM (2020) Anomaly detection on event logs with a scarcity of labels. In: 2020 2nd international conference on process mining (ICPM). IEEE, pp 161–168
go back to reference Kitchenham B, Charters S (2007) Guidelines for performing systematic literature reviews in software engineering. Tech. rep., EBSE Technical Report EBSE-2007-01 Kitchenham B, Charters S (2007) Guidelines for performing systematic literature reviews in software engineering. Tech. rep., EBSE Technical Report EBSE-2007-01
go back to reference Ko J, Comuzzi M (2021) Detecting anomalies in business process event logs using statistical leverage. Inf Syst 549:53–67 Ko J, Comuzzi M (2021) Detecting anomalies in business process event logs using statistical leverage. Inf Syst 549:53–67
go back to reference Ko J, Comuzzi M (2022) Keeping our rivers clean: Information-theoretic online anomaly detection for streaming business process events. Inf Syst 104(101):894 Ko J, Comuzzi M (2022) Keeping our rivers clean: Information-theoretic online anomaly detection for streaming business process events. Inf Syst 104(101):894
go back to reference Kolosova AA, Lomazova IA (2019) Detection of anomalies in the criminal proceedings based on the analysis of event logs. International conference on analysis of images, social networks and texts. Springer, Heidelberg, pp 401–410 Kolosova AA, Lomazova IA (2019) Detection of anomalies in the criminal proceedings based on the analysis of event logs. International conference on analysis of images, social networks and texts. Springer, Heidelberg, pp 401–410
go back to reference Koschmider A, Kaczmarek K, Krause M, Zelst SJv, (2021) Demystifying noise and outliers in event logs: review and future directions. In: International conference on business process management. Springer, Heidelberg, pp 123–135 Koschmider A, Kaczmarek K, Krause M, Zelst SJv, (2021) Demystifying noise and outliers in event logs: review and future directions. In: International conference on business process management. Springer, Heidelberg, pp 123–135
go back to reference Li X, Xue Y, Malin B (2012) Detecting anomalous user behaviors in workflow-driven web applications. In: 2012 IEEE 31st symposium on reliable distributed systems. IEEE, pp 1–10 Li X, Xue Y, Malin B (2012) Detecting anomalous user behaviors in workflow-driven web applications. In: 2012 IEEE 31st symposium on reliable distributed systems. IEEE, pp 1–10
go back to reference Lillegraven TN, Wolden AC (2010) Design of a bayesian recommender system for tourists presenting a solution to the cold-start user problem. Master’s thesis, Institutt for datateknikk og informasjonsvitenskap Lillegraven TN, Wolden AC (2010) Design of a bayesian recommender system for tourists presenting a solution to the cold-start user problem. Master’s thesis, Institutt for datateknikk og informasjonsvitenskap
go back to reference Linn C, Werth D (2016) Sequential anomaly detection techniques in business processes. International conference on business information systems. Springer, Heidelberg, pp 196–208 Linn C, Werth D (2016) Sequential anomaly detection techniques in business processes. International conference on business information systems. Springer, Heidelberg, pp 196–208
go back to reference Myers D, Suriadi S, Radke K, Foo E (2018) Anomaly detection for industrial control systems using process mining. Comput Secur 78:103–125CrossRef Myers D, Suriadi S, Radke K, Foo E (2018) Anomaly detection for industrial control systems using process mining. Comput Secur 78:103–125CrossRef
go back to reference Nguyen HTC, Lee S, Kim J, Ko J, Comuzzi M (2019) Autoencoders for improving quality of process event logs. Expert Syst Appl 131:132–147CrossRef Nguyen HTC, Lee S, Kim J, Ko J, Comuzzi M (2019) Autoencoders for improving quality of process event logs. Expert Syst Appl 131:132–147CrossRef
go back to reference Nolle T, Luettgen S, Seeliger A, Mühlhäuser M (2018) Analyzing business process anomalies using autoencoders. Mach Learn 107(11):1875–1893CrossRef Nolle T, Luettgen S, Seeliger A, Mühlhäuser M (2018) Analyzing business process anomalies using autoencoders. Mach Learn 107(11):1875–1893CrossRef
go back to reference Nolle T, Luettgen S, Seeliger A, Mühlhäuser M (2019) Binet: multi-perspective business process anomaly classification. Inf Syst 101458 Nolle T, Luettgen S, Seeliger A, Mühlhäuser M (2019) Binet: multi-perspective business process anomaly classification. Inf Syst 101458
go back to reference Nolle T, Seeliger A, Thoma N, Mühlhäuser M (2020) Deepalign: alignment-based process anomaly correction using recurrent neural networks. International conference on advanced information systems engineering. Springer, Heidelberg, pp 319–333CrossRef Nolle T, Seeliger A, Thoma N, Mühlhäuser M (2020) Deepalign: alignment-based process anomaly correction using recurrent neural networks. International conference on advanced information systems engineering. Springer, Heidelberg, pp 319–333CrossRef
go back to reference Omair B, Alturki A (2020) A systematic literature review of fraud detection metrics in business processes. IEEE Access 8:26893–26903CrossRef Omair B, Alturki A (2020) A systematic literature review of fraud detection metrics in business processes. IEEE Access 8:26893–26903CrossRef
go back to reference Pauwels S, Calders T (2019) An anomaly detection technique for business processes based on extended dynamic Bayesian networks. In: Proceedings of the 34th ACM/SIGAPP symposium on applied computing, pp 494–501 Pauwels S, Calders T (2019) An anomaly detection technique for business processes based on extended dynamic Bayesian networks. In: Proceedings of the 34th ACM/SIGAPP symposium on applied computing, pp 494–501
go back to reference Pimentel MA, Clifton DA, Clifton L, Tarassenko L (2014) A review of novelty detection. Signal Process 99:215–249CrossRef Pimentel MA, Clifton DA, Clifton L, Tarassenko L (2014) A review of novelty detection. Signal Process 99:215–249CrossRef
go back to reference Rama-Maneiro E, Vidal J, Lama M (2021) Deep learning for predictive business process monitoring: review and benchmark. IEEE Transact Service Comput Rama-Maneiro E, Vidal J, Lama M (2021) Deep learning for predictive business process monitoring: review and benchmark. IEEE Transact Service Comput
go back to reference Ribeiro CE, Zárate LE (2016) Data preparation for longitudinal data mining: a case study on human ageing. J Inf Data Manag 7(2):116–116 Ribeiro CE, Zárate LE (2016) Data preparation for longitudinal data mining: a case study on human ageing. J Inf Data Manag 7(2):116–116
go back to reference Riera TS, Higuera JRB, Higuera JB, Herraiz JJM, Montalvo JAS (2020) Prevention and fighting against web attacks through anomaly detection technology. A systematic review. Sustain 12(12):1–45 Riera TS, Higuera JRB, Higuera JB, Herraiz JJM, Montalvo JAS (2020) Prevention and fighting against web attacks through anomaly detection technology. A systematic review. Sustain 12(12):1–45
go back to reference Riveiro M, Pallotta G, Vespe M (2018) Maritime anomaly detection: a review. Wiley Interdisc Rev Data Min Knowl Discov 8(5):e1266CrossRef Riveiro M, Pallotta G, Vespe M (2018) Maritime anomaly detection: a review. Wiley Interdisc Rev Data Min Knowl Discov 8(5):e1266CrossRef
go back to reference Rullo A, Guzzo A, Serra E, Tirrito E (2020) A framework for the multi-modal analysis of novel behavior in business processes. International conference on intelligent data engineering and automated learning. Springer, Heidelberg, pp 51–63 Rullo A, Guzzo A, Serra E, Tirrito E (2020) A framework for the multi-modal analysis of novel behavior in business processes. International conference on intelligent data engineering and automated learning. Springer, Heidelberg, pp 51–63
go back to reference Saini V, Singh P, Sureka A (2020) Control-flow based anomaly detection in the bug-fixing process of open-source projects. In: Proceedings of the 13th innovations in software engineering conference on formerly known as India software engineering conference, pp 1–11 Saini V, Singh P, Sureka A (2020) Control-flow based anomaly detection in the bug-fixing process of open-source projects. In: Proceedings of the 13th innovations in software engineering conference on formerly known as India software engineering conference, pp 1–11
go back to reference Sani MF, van Zelst SJ, van der Aalst WMP (2018) Repairing outlier behaviour in event logs. International conference on business information systems. Springer, Heidelberg, pp 115–131CrossRef Sani MF, van Zelst SJ, van der Aalst WMP (2018) Repairing outlier behaviour in event logs. International conference on business information systems. Springer, Heidelberg, pp 115–131CrossRef
go back to reference Sani MF, van Zelst SJ, van der Aalst WMP (2019) Repairing outlier behaviour in event logs using contextual behaviour. Enterp Modell Inf Syst Architec (EMISAJ) 14:5–1 Sani MF, van Zelst SJ, van der Aalst WMP (2019) Repairing outlier behaviour in event logs using contextual behaviour. Enterp Modell Inf Syst Architec (EMISAJ) 14:5–1
go back to reference Saraeian S, Shirazi B (2020) Process mining-based anomaly detection of additive manufacturing process activities using a game theory modeling approach. Comput Indust Eng 146(106):584 Saraeian S, Shirazi B (2020) Process mining-based anomaly detection of additive manufacturing process activities using a game theory modeling approach. Comput Indust Eng 146(106):584
go back to reference Sarno R, Sinaga F, Sungkono KR (2020) Anomaly detection in business processes using process mining and fuzzy association rule learning. J Big Data 7(1):1–19CrossRef Sarno R, Sinaga F, Sungkono KR (2020) Anomaly detection in business processes using process mining and fuzzy association rule learning. J Big Data 7(1):1–19CrossRef
go back to reference Schumann G, Kruse F, Nonnenmacher J (2020) A practice-oriented, control-flow-based anomaly detection approach for internal process audits. International conference on service-oriented computing. Springer, Heidelberg, pp 533–543CrossRef Schumann G, Kruse F, Nonnenmacher J (2020) A practice-oriented, control-flow-based anomaly detection approach for internal process audits. International conference on service-oriented computing. Springer, Heidelberg, pp 533–543CrossRef
go back to reference Setiawan W, Thounaojam Y, Narayan A (2020) Gwad: Greedy workflow graph anomaly detection framework for system traces. In: 2020 IEEE international conference on systems, man, and cybernetics (SMC). IEEE, pp 2790–2796 Setiawan W, Thounaojam Y, Narayan A (2020) Gwad: Greedy workflow graph anomaly detection framework for system traces. In: 2020 IEEE international conference on systems, man, and cybernetics (SMC). IEEE, pp 2790–2796
go back to reference Singh K, Upadhyaya S (2012) Outlier detection: applications and techniques. Int J Comput Sci Issue (IJCSI) 9(1):307 Singh K, Upadhyaya S (2012) Outlier detection: applications and techniques. Int J Comput Sci Issue (IJCSI) 9(1):307
go back to reference Sureda Riera T, Bermejo Higuera JR, Bermejo Higuera J, Martínez Herraiz JJ, Sicilia Montalvo JA (2020) Prevention and fighting against web attacks through anomaly detection technology. A systematic review. Sustain 12(12):4945CrossRef Sureda Riera T, Bermejo Higuera JR, Bermejo Higuera J, Martínez Herraiz JJ, Sicilia Montalvo JA (2020) Prevention and fighting against web attacks through anomaly detection technology. A systematic review. Sustain 12(12):4945CrossRef
go back to reference Tavares GM, Barbon S (2020) Analysis of language inspired trace representation for anomaly detection. ADBIS, TPDL and EDA 2020 common workshops and doctoral consortium. Springer, Heidelberg, pp 296–308CrossRef Tavares GM, Barbon S (2020) Analysis of language inspired trace representation for anomaly detection. ADBIS, TPDL and EDA 2020 common workshops and doctoral consortium. Springer, Heidelberg, pp 296–308CrossRef
go back to reference Tavares GM, da Costa VGT, Martins VE, Ceravolo P, Barbon S Jr (2019) Leveraging anomaly detection in business process with data stream mining. iSys-Revista Brasileira de Sistemas de Informação 12(1):54–75 Tavares GM, da Costa VGT, Martins VE, Ceravolo P, Barbon S Jr (2019) Leveraging anomaly detection in business process with data stream mining. iSys-Revista Brasileira de Sistemas de Informação 12(1):54–75
go back to reference van der Aalst WMP (2011) Process discovery: an introduction. In: van der Aalst WMP (ed) Process mining. Springer, Heidelberg, pp 125–156CrossRef van der Aalst WMP (2011) Process discovery: an introduction. In: van der Aalst WMP (ed) Process mining. Springer, Heidelberg, pp 125–156CrossRef
go back to reference van der Aalst WMP (2016) Process mining: data science in action, vol 2. Springer, HeidelbergCrossRef van der Aalst WMP (2016) Process mining: data science in action, vol 2. Springer, HeidelbergCrossRef
go back to reference van der Aalst WMP, de Medeiros AKA (2005) Process mining and security: detecting anomalous process executions and checking process conformance. Electron Notes Theor Comput Sci 121:3–21CrossRef van der Aalst WMP, de Medeiros AKA (2005) Process mining and security: detecting anomalous process executions and checking process conformance. Electron Notes Theor Comput Sci 121:3–21CrossRef
go back to reference van der Aalst WMP, Bichler M, Heinzl A (2018) Robotic process automation. Springer, Heidelberg van der Aalst WMP, Bichler M, Heinzl A (2018) Robotic process automation. Springer, Heidelberg
go back to reference Vijayakamal M, Vasumathi D (2020) Unsupervised learning methods for anomaly detection and log quality improvement using process event log. Int J Adv Sci Technol 1109–1125 Vijayakamal M, Vasumathi D (2020) Unsupervised learning methods for anomaly detection and log quality improvement using process event log. Int J Adv Sci Technol 1109–1125
go back to reference Witten IH, Frank E, Hall MA, Pal CJ, DATA M (2005) Practical machine learning tools and techniques. In: Data min, vol 2 Witten IH, Frank E, Hall MA, Pal CJ, DATA M (2005) Practical machine learning tools and techniques. In: Data min, vol 2
go back to reference van Zelst SJ, van Dongen BF, van der Aalst WMP (2018) Event stream-based process discovery using abstract representations. Knowl Inf Syst 54(2):407–435CrossRef van Zelst SJ, van Dongen BF, van der Aalst WMP (2018) Event stream-based process discovery using abstract representations. Knowl Inf Syst 54(2):407–435CrossRef
go back to reference van Zelst SJ, Sani MF, Ostovar A, Conforti R, La Rosa M (2020) Detection and removal of infrequent behavior from event streams of business processes. Inf Syst 90(101):451 van Zelst SJ, Sani MF, Ostovar A, Conforti R, La Rosa M (2020) Detection and removal of infrequent behavior from event streams of business processes. Inf Syst 90(101):451
go back to reference vom Brocke J, Jans M, Mendling J, Reijers HA (2021) A five-level framework for research on process mining. Bus Inf Syst Eng 63(5):483–490CrossRef vom Brocke J, Jans M, Mendling J, Reijers HA (2021) A five-level framework for research on process mining. Bus Inf Syst Eng 63(5):483–490CrossRef
go back to reference Zerbino P, Stefanini A, Aloini D (2021) Process science in action: a literature review on process mining in business management. Technol Forecast Soc Change 172(121):021 Zerbino P, Stefanini A, Aloini D (2021) Process science in action: a literature review on process mining in business management. Technol Forecast Soc Change 172(121):021
go back to reference Zhu T, Guo Y, Ju A, Ma J, Wang X (2017) An insider threat detection method based on business process mining. Int J Bus Data Commun Netw (IJBDCN) 13(2):83–98CrossRef Zhu T, Guo Y, Ju A, Ma J, Wang X (2017) An insider threat detection method based on business process mining. Int J Bus Data Commun Netw (IJBDCN) 13(2):83–98CrossRef
Metadata
Title
A Systematic Review of Anomaly Detection for Business Process Event Logs
Authors
Jonghyeon Ko
Marco Comuzzi
Publication date
10-03-2023
Publisher
Springer Fachmedien Wiesbaden
Published in
Business & Information Systems Engineering / Issue 4/2023
Print ISSN: 2363-7005
Electronic ISSN: 1867-0202
DOI
https://doi.org/10.1007/s12599-023-00794-y

Other articles of this Issue 4/2023

Business & Information Systems Engineering 4/2023 Go to the issue

Premium Partner