Skip to main content
Top
Published in:
Cover of the book

2018 | OriginalPaper | Chapter

Association Rules for Anomaly Detection and Root Cause Analysis in Process Executions

Authors : Kristof Böhmer, Stefanie Rinderle-Ma

Published in: Advanced Information Systems Engineering

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Existing business process anomaly detection approaches typically fall short in supporting experts when analyzing identified anomalies. Hereby, false positives and insufficient anomaly countermeasures might impact an organization in a severely negative way. This work tackles this limitation by basing anomaly detection on association rule mining. It will be shown that doing so enables to explain anomalies, support process change and flexible executions, and to facilitate the estimation of anomaly severity. As a consequence, the risk of choosing an inappropriate countermeasure is likely reduced which, for example, helps to avoid the termination of benign process executions due to mistaken anomalies and false positives. The feasibility of the proposed approach is shown based on a publicly available prototypical implementation as well as by analyzing real life logs with injected artificial anomalies.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Van der Aalst, W.M., de Medeiros, A.K.A.: Process mining and security: detecting anomalous process executions and checking process conformance. Theor. Comput. Sci. 121, 3–21 (2005)MATH Van der Aalst, W.M., de Medeiros, A.K.A.: Process mining and security: detecting anomalous process executions and checking process conformance. Theor. Comput. Sci. 121, 3–21 (2005)MATH
2.
go back to reference Agrawal, R., Srikant, R., et al.: Fast algorithms for mining association rules. In: Very Large Data Bases, vol. 1215, pp. 487–499 (1994) Agrawal, R., Srikant, R., et al.: Fast algorithms for mining association rules. In: Very Large Data Bases, vol. 1215, pp. 487–499 (1994)
3.
go back to reference Bezerra, F., et al.: Anomaly detection using process mining. Enterp. Bus. Process Inf. Syst. Model. 29, 149–161 (2009) Bezerra, F., et al.: Anomaly detection using process mining. Enterp. Bus. Process Inf. Syst. Model. 29, 149–161 (2009)
4.
go back to reference Böhmer, K., Rinderle-Ma, S.: Anomaly detection in business process runtime behavior-challenges and limitations. arXiv arXiv:1705.06659 (2017) Böhmer, K., Rinderle-Ma, S.: Anomaly detection in business process runtime behavior-challenges and limitations. arXiv arXiv:​1705.​06659 (2017)
7.
go back to reference Brucker, A.D., Hang, I., Lückemeyer, G., Ruparel, R.: SecureBPMN: modeling and enforcing access control requirements in business processes. In: Access Control Models and Technologies, pp. 123–126. ACM (2012) Brucker, A.D., Hang, I., Lückemeyer, G., Ruparel, R.: SecureBPMN: modeling and enforcing access control requirements in business processes. In: Access Control Models and Technologies, pp. 123–126. ACM (2012)
8.
go back to reference Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. Comput. Surv. 41(3), 15 (2009)CrossRef Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. Comput. Surv. 41(3), 15 (2009)CrossRef
9.
go back to reference Chinchor, N., Sundheim, B.: MUC-5 evaluation metrics. In: Message Understanding, pp. 69–78. Computational Linguistics (1993) Chinchor, N., Sundheim, B.: MUC-5 evaluation metrics. In: Message Understanding, pp. 69–78. Computational Linguistics (1993)
10.
go back to reference Czepa, C., et al.: Plausibility checking of formal business process specifications in linear temporal logic, pp. 1–8 (2016) Czepa, C., et al.: Plausibility checking of formal business process specifications in linear temporal logic, pp. 1–8 (2016)
11.
go back to reference Greco, G., Guzzo, A., Pontieri, L.: Mining taxonomies of process models. Data Knowl. Eng. 67(1), 74–102 (2008)CrossRef Greco, G., Guzzo, A., Pontieri, L.: Mining taxonomies of process models. Data Knowl. Eng. 67(1), 74–102 (2008)CrossRef
12.
go back to reference Gupta, M., Gao, J., Aggarwal, C.C., Han, J.: Outlier detection for temporal data: a survey. Knowl. Data Eng. 26(9), 2250–2267 (2014)CrossRef Gupta, M., Gao, J., Aggarwal, C.C., Han, J.: Outlier detection for temporal data: a survey. Knowl. Data Eng. 26(9), 2250–2267 (2014)CrossRef
13.
go back to reference Julisch, K.: Clustering intrusion detection alarms to support root cause analysis. Inf. Syst. Secur. 6(4), 443–471 (2003) Julisch, K.: Clustering intrusion detection alarms to support root cause analysis. Inf. Syst. Secur. 6(4), 443–471 (2003)
14.
go back to reference Ly, L.T., Maggi, F.M., Montali, M., Rinderle-Ma, S., van der Aalst, W.M.: Compliance monitoring in business processes: functionalities, application, and tool-support. Inf. Syst. 54, 209–234 (2015)CrossRef Ly, L.T., Maggi, F.M., Montali, M., Rinderle-Ma, S., van der Aalst, W.M.: Compliance monitoring in business processes: functionalities, application, and tool-support. Inf. Syst. 54, 209–234 (2015)CrossRef
18.
go back to reference Sarno, R., et al.: Hybrid association rule learning and process mining for fraud detection. Comput. Sci. 42(2), 59–72 (2015) Sarno, R., et al.: Hybrid association rule learning and process mining for fraud detection. Comput. Sci. 42(2), 59–72 (2015)
19.
go back to reference Tan, P.N., Steinbach, M., Kumar, V.: Introduction to Data Mining, 1st edn. Addison-Wesley, Boston (2005) Tan, P.N., Steinbach, M., Kumar, V.: Introduction to Data Mining, 1st edn. Addison-Wesley, Boston (2005)
20.
go back to reference Vogelgesang, T., et al.: Multidimensional process mining: questions, requirements, and limitations. In: CAISE Forum, pp. 169–176. Springer, Heidelberg (2016) Vogelgesang, T., et al.: Multidimensional process mining: questions, requirements, and limitations. In: CAISE Forum, pp. 169–176. Springer, Heidelberg (2016)
Metadata
Title
Association Rules for Anomaly Detection and Root Cause Analysis in Process Executions
Authors
Kristof Böhmer
Stefanie Rinderle-Ma
Copyright Year
2018
DOI
https://doi.org/10.1007/978-3-319-91563-0_1

Premium Partner