A great concern for organizations is to detect anomalous process instances within their business processes. For that, conformance checking performs model-aware analysis by comparing process logs to business models for the detection of anomalous process executions. However, in several scenarios, a model is either unavailable or its generation is costly, which requires the employment of alternative methods to allow a confident representation of traces. This work supports the analysis of language inspired process analysis grounded in the word2vec encoding algorithm. We argue that natural language encodings correctly model the behavior of business processes, supporting a proper distinction between common and anomalous behavior. In the experiments, we compared accuracy and time cost among different word2vec setups and classic encoding methods (token-based replay and alignment features), addressing seven different anomaly scenarios. Feature importance values and the impact of different anomalies in seven event logs were also evaluated to bring insights on the trace representation subject. Results show the proposed encoding overcomes representational capability of traditional conformance metrics for the anomaly detection task.
Analysis of Language Inspired Trace Representation for Anomaly Detection
Barbon Junior
2020-01-01
Abstract
A great concern for organizations is to detect anomalous process instances within their business processes. For that, conformance checking performs model-aware analysis by comparing process logs to business models for the detection of anomalous process executions. However, in several scenarios, a model is either unavailable or its generation is costly, which requires the employment of alternative methods to allow a confident representation of traces. This work supports the analysis of language inspired process analysis grounded in the word2vec encoding algorithm. We argue that natural language encodings correctly model the behavior of business processes, supporting a proper distinction between common and anomalous behavior. In the experiments, we compared accuracy and time cost among different word2vec setups and classic encoding methods (token-based replay and alignment features), addressing seven different anomaly scenarios. Feature importance values and the impact of different anomalies in seven event logs were also evaluated to bring insights on the trace representation subject. Results show the proposed encoding overcomes representational capability of traditional conformance metrics for the anomaly detection task.File | Dimensione | Formato | |
---|---|---|---|
(Communications in Computer and Information Science 1260) Ladjel Bellatreche, Mária Bieliková, Omar Boussaïd, Barbara Catania, Jérôme Darmont, Elena Demidova, Fabien Duchateau, Mark Hall, Tanja Merčun(1).pdf
Accesso chiuso
Descrizione: cover, contents, conference paper
Tipologia:
Documento in Versione Editoriale
Licenza:
Copyright Editore
Dimensione
495.38 kB
Formato
Adobe PDF
|
495.38 kB | Adobe PDF | Visualizza/Apri Richiedi una copia |
(Communications+in+Computer+and+Information+Science+1260)+Ladjel+Bellatreche,+Mária+Bieliková,+Omar+Boussaïd,+Barbara+Catania,+Jérôme+Darmont,+Elena+Demidova,+Fabien+Duchateau,+Mark+Hall,+Tanja+Merčun(1)-Post_print.pdf
Open Access dal 19/08/2021
Tipologia:
Bozza finale post-referaggio (post-print)
Licenza:
Digital Rights Management non definito
Dimensione
907.53 kB
Formato
Adobe PDF
|
907.53 kB | Adobe PDF | Visualizza/Apri |
Pubblicazioni consigliate
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.