Outlier detection techniques for process mining applications

被引:0
|
作者
Ghionna, Lucantonio [1 ]
Greco, Gianluigi [1 ]
Guzzo, Antonella [2 ]
Pontieri, Luigi [3 ]
机构
[1] UNICAL, Dept Math, Via P Bucci 30B, I-87036 Arcavacata Di Rende, Italy
[2] UNICAL, DEIS, Arcavacata Di Rende, Italy
[3] ICAR, CNR, Arcavacata Di Rende, Italy
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Classical outlier detection approaches may hardly fit process mining applications, since in these settings anomalies emerge not only as deviations from the sequence of events most often registered in the log, but also as deviations from the behavior prescribed by some (possibly unknown) process model. These issues have been faced in the paper via an approach for singling out anomalous evolutions within a set of process traces, which takes into account both statistical properties of the log and the constraints associated with the process model. The approach combines the discovery of frequent execution patterns with a cluster-based anomaly detection procedure; notably, this procedure is suited to deal with categorical data and is, hence, interesting in its own, given that outlier detection has mainly been studied on numerical domains in the literature. All the algorithms presented in the paper have been implemented and integrated into a system prototype that has been thoroughly tested to assess its scalability and effectiveness.
引用
收藏
页码:150 / +
页数:2
相关论文
共 50 条
  • [1] Outlier Detection: Applications and Techniques in Data Mining
    Bansal, Rashi
    Gaur, Nishant
    Singh, Shailendra Narayan
    2016 6TH INTERNATIONAL CONFERENCE - CLOUD SYSTEM AND BIG DATA ENGINEERING (CONFLUENCE), 2016, : 373 - 377
  • [2] Outlier Detection: Applications And Techniques
    HQ Base Workshop Group EME, Meerut Cantt, UP, India
    不详
    Int. J. Comput. Sci. Issues, 1 1-3 (307-323):
  • [3] Applying Sequence Mining for Outlier Detection in Process Mining
    Sani, Mohammadreza Fani
    Van Zelst, Sebastiaan J.
    Van der Aalst, Wil M. P.
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS (OTM 2018), PT II, 2018, 11230 : 98 - 116
  • [4] Outlier detection with data mining techniques and statistical methods
    Orellana, Marcos
    Cedillo, Priscila
    ENFOQUE UTE, 2020, 11 (01): : 56 - 67
  • [5] A comparative study for outlier detection techniques in data mining
    Abu Bakar, Zuriana
    Mohemad, Rosmayati
    Ahmad, Akbar
    Deris, Mustafa Mat
    2006 IEEE CONFERENCE ON CYBERNETICS AND INTELLIGENT SYSTEMS, VOLS 1 AND 2, 2006, : 360 - +
  • [6] Research of Outlier Mining Based Adaptive Intrusion Detection Techniques
    Ke, Fang Yu
    Yan, Fu
    Lin, Zhou Jun
    THIRD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING: WKDD 2010, PROCEEDINGS, 2010, : 552 - 555
  • [7] Process Mining in Manufacturing: Goals, Techniques and Applications
    Stefanovic, Darko
    Dakic, Dusanka
    Stevanov, Branislav
    Lolic, Teodora
    ADVANCES IN PRODUCTION MANAGEMENT SYSTEMS: THE PATH TO DIGITAL TRANSFORMATION AND INNOVATION OF PRODUCTION MANAGEMENT SYSTEMS, PT I, 2020, 591 : 54 - 62
  • [8] Outlier Mining Techniques for Software Defect Prediction
    Cech, Tim
    Atzberger, Daniel
    Scheibel, Willy
    Misra, Sanjay
    Doellner, Juergen
    SOFTWARE QUALITY: HIGHER SOFTWARE QUALITY THROUGH ZERO WASTE DEVELOPMENT, SWQD 2023, 2023, 472 : 41 - 60
  • [9] Outlier Detection Algorithms in Data Mining
    Xi, Jingke
    2008 INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY APPLICATION, VOL I, PROCEEDINGS, 2008, : 94 - 97
  • [10] Process mining techniques and applications - A systematic mapping study
    Garcia, Cleiton dos Santos
    Meincheim, Alex
    Faria Junior, Elio Ribeiro
    Dallagassa, Marcelo Rosano
    Vecino Sato, Denise Maria
    Carvalho, Deborah Ribeiro
    Portela Santos, Eduardo Alves
    Scalabrin, Edson Emilio
    EXPERT SYSTEMS WITH APPLICATIONS, 2019, 133 : 260 - 295