Advanced SearchSearch Tips
Detection of API(Anomaly Process Instance) Based on Distance for Process Mining
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
Detection of API(Anomaly Process Instance) Based on Distance for Process Mining
Jeon, Daeuk; Bae, Hyerim;
  PDF(new window)
There have been many attempts to find knowledge from data using conventional statistics, data mining, artificial intelligence, machine learning and pattern recognition. In those research areas, knowledge is approached in two ways. Firstly, researchers discover knowledge represented in general features for universal recognition, and secondly, they discover exceptional and distinctive features. In process mining, an instance is sequential information bounded by case ID, known as process instance. Here, an exceptional process instance can cause a problem in the analysis and discovery algorithm. Hence, in this paper we develop a method to detect the knowledge of exceptional and distinctive features when performing process mining. We propose a method for anomaly detection named Distance-based Anomaly Process Instance Detection (DAPID) which utilizes distance between process instances. DAPID contributes to a discovery of distinctive characteristic of process instance. For verifying the suggested methodology, we discovered characteristics of exceptional situations from log data. Additionally, we experiment on real data from a domestic port terminal to demonstrate our proposed methodology.
Anomaly process instance;Process mining;Arc matrix;
 Cited by
Agarwal, B. and Mittal, N. (2012), Hybrid Approach for Detection of Anomaly Network Traffic using Data Mining Techniques. Procedia Technology, 6, 996-1003. crossref(new window)

Aggarwal, C. C. (2013), Outlier analysis : Springer Science and Business Media.

Agrawal, R. and Srikant, R. (1995), Mining sequential patterns, Paper presented at the Data Engineering, Proceedings of the Eleventh International Conference on.

Bae, J., Liu, L., Caverlee, J., and Rouse, W. B. (2006), Process Mining, Discovery, and Integration using Distance Measures, Paper presented at the Web Services, ICWS 2006. International Conference on.

Bezerra, F. and Wainer, J. (2013), Algorithms for anomaly detection of traces in logs of process aware information systems. Information Systems, 38(1), 33-44. crossref(new window)

Ciflikli, C. and Kahya-Ozyirmidokuz, E. (2010), Implementing a data mining solution for enhancing carpet manufacturing productivity. Knowledge-Based Systems, 23(8), 783-788. crossref(new window)

Du, W., Fang, L. and Peng, N. (2006), LAD : Localization anomaly detection for wireless sensor networks. Journal of Parallel and Distributed Computing, 66(7), 874-886. crossref(new window)

Han, J., Kamber, M., and Pei, J. (2012), Data mining : concepts and techniques : Morgan Kaufmann.

Hawkins, D. M. (1980), Identification of outliers : Springer, 11.

Laxhammar, R. (2014), Anomaly Detection, Conformal Prediction for Reliable Machine Learning : Theory, Adaptations, and Applications, Elsevier Insight Series, Morgan-Kaufmann Publishers.

Lin, S. and Brown, D. E. (2006), An outlier-based data association method for linking criminal incidents. Decision Support Systems, 41(3), 604-615. crossref(new window)

Ngai, E. W. T. et al. (2011), The application of data mining techniques in financial fraud detection : A classification framework and an academic review of literature. Decision Support Systems, 50(3), 559-569. crossref(new window)

Pei, J. et al. (2001), Prefixspan : Mining sequential patterns efficiently by prefix-projected pattern growth, Paper presented at the International Conference on Knowledge Discovery in Databases and Data Mining.

Potter, C. et al. (2003), Major disturbance events in terrestrial ecosystems detected using global satellite data sets. Global Change Biology, 9(7), 1005-1021. crossref(new window)

Purarjomandlangrudi, A., Ghapanchi, A. H., and Esmalifalak, M. (2014), A data mining approach for fault diagnosis : An application of anomaly detection algorithm. Measurement, 55, 343-352. crossref(new window)

Rebuge, A. and Ferreira, D. R. (2012), Business process analysis in healthcare environments : A methodology based on process mining. Information Systems, 37(2), 99-116. crossref(new window)

Shyur, H.-J., Jou, C., and Chang, K. (2013), A data mining approach to discovering reliable sequential patterns. Journal of Systems and Software, 86(8), 2196-2203. crossref(new window)

Sim, S. et al. (2012), Healthcare process pattern analysis with triage in the emergency department. Journal of the Korean Operations Research and Management Science Society, 37(4), 111-124. crossref(new window)

van der Aalst, W. M. P. (2011), Discovery, Conformance and Enhancement of Business Processes : Springer.

van der Aalst, W. M. P. et al. (2012), Process mining manifesto, Paper presented at the Business Process Management Workshops.

van der Aalst, W. M. P. et al. (2007). Business process mining : An industrial application. Information Systems, 32(5), 713-732. crossref(new window)

Witten, I. H., Frank, E., and Hall, M. A. (2011), Data Mining : Practical machine learning tools and techniques (3rd ed.) : Morgan Kaufmann.

Yang, H. and Song, M. (2015), Analyzing Repair Processes Using Process Mining : A Case Study. Journal of the Korean Institute of Industrial Engineers, 41(1), 86-96. crossref(new window)