Outlier detection techniques for process mining applications

被引:0
|
作者
Ghionna, Lucantonio [1 ]
Greco, Gianluigi [1 ]
Guzzo, Antonella [2 ]
Pontieri, Luigi [3 ]
机构
[1] UNICAL, Dept Math, Via P Bucci 30B, I-87036 Arcavacata Di Rende, Italy
[2] UNICAL, DEIS, Arcavacata Di Rende, Italy
[3] ICAR, CNR, Arcavacata Di Rende, Italy
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Classical outlier detection approaches may hardly fit process mining applications, since in these settings anomalies emerge not only as deviations from the sequence of events most often registered in the log, but also as deviations from the behavior prescribed by some (possibly unknown) process model. These issues have been faced in the paper via an approach for singling out anomalous evolutions within a set of process traces, which takes into account both statistical properties of the log and the constraints associated with the process model. The approach combines the discovery of frequent execution patterns with a cluster-based anomaly detection procedure; notably, this procedure is suited to deal with categorical data and is, hence, interesting in its own, given that outlier detection has mainly been studied on numerical domains in the literature. All the algorithms presented in the paper have been implemented and integrated into a system prototype that has been thoroughly tested to assess its scalability and effectiveness.
引用
收藏
页码:150 / +
页数:2
相关论文
共 50 条
  • [41] Approach of Outlier Detection in Process Control System
    Wang, Wenjing
    Wang, Biao
    Mao, Zhizhong
    Song, Yanli
    2015 27TH CHINESE CONTROL AND DECISION CONFERENCE (CCDC), 2015, : 4350 - 4354
  • [42] Bayesian Outlier Detection with Dirichlet Process Mixtures
    Shotwell, Matthew S.
    Slate, Elizabeth H.
    BAYESIAN ANALYSIS, 2011, 6 (04): : 665 - 690
  • [43] A comparison between statistical & fuzzy techniques in outlier detection
    Aliosmanoglu, S
    Akyilmaz, O
    VISTAS FOR GEODESY IN THE NEW MILLENNIUM, 2002, 125 : 382 - 387
  • [44] Outlier Detection Techniques for Wireless Sensor Networks: A Survey
    Zhang, Yang
    Meratnia, Nirvana
    Havinga, Paul
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2010, 12 (02): : 159 - 170
  • [45] Workflow mining and outlier detection from clinical activity logs
    Bouarfa, L.
    Dankelman, J.
    JOURNAL OF BIOMEDICAL INFORMATICS, 2012, 45 (06) : 1185 - 1190
  • [46] Outlier detection and data association for data mining criminal incidents
    Lin, S
    Brown, DE
    DATA MINING III, 2002, 6 : 125 - 134
  • [47] A Survey of Outlier Detection Techniques in IoT: Review and Classification
    Al Samara, Mustafa
    Bennis, Ismail
    Abouaissa, Abdelhafid
    Lorenz, Pascal
    JOURNAL OF SENSOR AND ACTUATOR NETWORKS, 2022, 11 (01)
  • [48] Outlier Mining Based Abnormal Machine Detection in Intelligent Maintenance
    张蕾
    曹其新
    李杰
    JournalofShanghaiJiaotongUniversity(Science), 2009, 14 (06) : 695 - 700
  • [49] Outlier mining based abnormal machine detection in intelligent maintenance
    Zhang L.
    Cao Q.-X.
    Lee J.
    Journal of Shanghai Jiaotong University (Science), 2009, 14 (06) : 695 - 700
  • [50] Density Based Outlier Mining Algorithm with Application to Intrusion Detection
    Yang, Peng
    Huang, Biao
    PACIIA: 2008 PACIFIC-ASIA WORKSHOP ON COMPUTATIONAL INTELLIGENCE AND INDUSTRIAL APPLICATION, VOLS 1-3, PROCEEDINGS, 2008, : 489 - 492