Detecting Context-Aware Deviations in Process Executions
Lecture Notes in Business Information Processing
Abstract
Prescriptive process monitoring approaches leverage historical data to prescribe runtime interventions that will likely prevent negative case outcomes or improve a process’s performance. A centerpiece of a prescriptive process monitoring method is its intervention policy: a decision function determining if and when to trigger an intervention on an ongoing case. Previous proposals in this field rely on intervention policies that consider only the current state of a given case. These approaches do not consider the tradeoff between triggering an intervention in the current state, given the level of uncertainty of the underlying predictive models, versus delaying the intervention to a later state. Moreover, they assume that a resource is always available to perform an intervention (infinite capacity). This paper addresses these gaps by introducing a prescriptive process monitoring method that filters and ranks ongoing cases based on prediction scores, prediction uncertainty, and causal ...
References (18)
- van der Aalst, W.M.P., Adriansyah, A., van Dongen, B.F.: Replaying history on process models for conformance checking and performance analysis. Wiley Inter- discip. Rev. Data Min. Knowl. Discov. 2(2), 182-192 (2012)
- van der Aalst, W.M.P., Dustdar, S.: Process mining put into context. IEEE Internet Computing 16(1), 82-86 (2012)
- Bezerra, F., Wainer, J.: Algorithms for anomaly detection of traces in logs of process aware information systems. Information Systems 38(1), 33-44 (2013)
- Böhmer, K., Rinderle-Ma, S.: Anomaly detection in business process runtime be- havior -challenges and limitations. CoRR abs/1705.06659 (2017)
- Böhmer, K., Rinderle-Ma, S.: Multi instance anomaly detection in business process executions. In: et al, J.C. (ed.) BPM 2017. LNCS, vol. 10445, pp. 77-93 (2017)
- Böhmer, K., Rinderle-Ma, S.: Mining association rules for anomaly detection in dynamic process runtime behavior and explaining the root cause to users. Infor- mation Systems 90, 101438 (2020)
- Dockhorn Costa, P., Almeida, J.P.A., Ferreira Pires, L., van Sinderen, M.: Situation specification and realization in rule-based context-aware applications. In: Indulska, J., Raymond, K. (eds.) Distributed Applications and Interoperable Systems. pp. 32-47 (2007)
- Jalali, H., Baraani, A.: Genetic-based anomaly detection in logs of process aware systems. World Academy of Science, Engineering and Technology 64(4), 304-309 (2010)
- Kronsbein, D., Meiser, D., Leyer, M.: Conceptualisation of contextual factors for business process performance. Lecture Notes in Engineering and Computer Science 2210 (2014)
- Leemans, S.J.J., Fahland, D., van der Aalst, W.M.P.: Discovering block-structured process models from event logs containing infrequent behaviour. In: et al, N.L. (ed.) Business Process Management Workshops -BPM 2013 International Workshops. LNBIP, vol. 171, pp. 66-78 (2013)
- Li, G., van der Aalst, W.M.P.: A framework for detecting deviations in complex event logs. Intelligent Data Analysis 21(4), 759-779 (2017)
- Mannhardt, F., de Leoni, M., Reijers, H.A., van der Aalst, W.M.P.: Balanced multi- perspective checking of process conformance. Computing 98(4), 407-437 (2016)
- Nolle, T., Luettgen, S., Seeliger, A., Mühlhäuser, M.: Analyzing business process anomalies using autoencoders. Mach. Learn. 107(11), 1875-1893 (2018)
- Nolle, T., Luettgen, S., Seeliger, A., Mühlhäuser, M.: BINet: Multi-perspective business process anomaly classification. CoRR abs/1902.03155 (2019)
- Pauwels, S.: An anomaly detection technique for business processes based on ex- tended dynamic Bayesian networks. Proceedings of the ACM Symposium on Ap- plied Computing Part F1477, 494-501 (2019)
- Song, R., Vanthienen, J., Cui, W., Wang, Y., Huang, L.: Towards a comprehensive understanding of the context concepts in context-aware business processes. In: Betz, S. (ed.) S-BPM ONE 2019. pp. 5:1-5:10 (2019)
- Warrender, C., Forrest, S., Pearlmutter, B.A.: Detecting intrusions using system calls: Alternative data models. In: 1999 IEEE Symposium on Security and Privacy. pp. 133-145 (1999)
- Ye, J., Dobson, S., McKeever, S.: Situation identification techniques in pervasive computing: A review. Pervasive and Mobile Computing 8(1), 36-66 (2012)