DOI QR코드

DOI QR Code

프로세스 마이닝을 위한 거리 기반의 API(Anomaly Process Instance) 탐지법

Detection of API(Anomaly Process Instance) Based on Distance for Process Mining

  • Jeon, Daeuk (Department of Industrial Engineering, Pusan National University) ;
  • Bae, Hyerim (Department of Industrial Engineering, Pusan National University)
  • 투고 : 2015.03.20
  • 심사 : 2015.09.30
  • 발행 : 2015.12.15

초록

There have been many attempts to find knowledge from data using conventional statistics, data mining, artificial intelligence, machine learning and pattern recognition. In those research areas, knowledge is approached in two ways. Firstly, researchers discover knowledge represented in general features for universal recognition, and secondly, they discover exceptional and distinctive features. In process mining, an instance is sequential information bounded by case ID, known as process instance. Here, an exceptional process instance can cause a problem in the analysis and discovery algorithm. Hence, in this paper we develop a method to detect the knowledge of exceptional and distinctive features when performing process mining. We propose a method for anomaly detection named Distance-based Anomaly Process Instance Detection (DAPID) which utilizes distance between process instances. DAPID contributes to a discovery of distinctive characteristic of process instance. For verifying the suggested methodology, we discovered characteristics of exceptional situations from log data. Additionally, we experiment on real data from a domestic port terminal to demonstrate our proposed methodology.

키워드

참고문헌

  1. Agarwal, B. and Mittal, N. (2012), Hybrid Approach for Detection of Anomaly Network Traffic using Data Mining Techniques. Procedia Technology, 6, 996-1003. https://doi.org/10.1016/j.protcy.2012.10.121
  2. Aggarwal, C. C. (2013), Outlier analysis : Springer Science and Business Media.
  3. Agrawal, R. and Srikant, R. (1995), Mining sequential patterns, Paper presented at the Data Engineering, Proceedings of the Eleventh International Conference on.
  4. Bae, J., Liu, L., Caverlee, J., and Rouse, W. B. (2006), Process Mining, Discovery, and Integration using Distance Measures, Paper presented at the Web Services, ICWS 2006. International Conference on.
  5. Bezerra, F. and Wainer, J. (2013), Algorithms for anomaly detection of traces in logs of process aware information systems. Information Systems, 38(1), 33-44. https://doi.org/10.1016/j.is.2012.04.004
  6. Ciflikli, C. and Kahya-Ozyirmidokuz, E. (2010), Implementing a data mining solution for enhancing carpet manufacturing productivity. Knowledge-Based Systems, 23(8), 783-788. https://doi.org/10.1016/j.knosys.2010.05.001
  7. Du, W., Fang, L. and Peng, N. (2006), LAD : Localization anomaly detection for wireless sensor networks. Journal of Parallel and Distributed Computing, 66(7), 874-886. https://doi.org/10.1016/j.jpdc.2005.12.011
  8. Han, J., Kamber, M., and Pei, J. (2012), Data mining : concepts and techniques : Morgan Kaufmann.
  9. Hawkins, D. M. (1980), Identification of outliers : Springer, 11.
  10. Laxhammar, R. (2014), Anomaly Detection, Conformal Prediction for Reliable Machine Learning : Theory, Adaptations, and Applications, Elsevier Insight Series, Morgan-Kaufmann Publishers.
  11. Lin, S. and Brown, D. E. (2006), An outlier-based data association method for linking criminal incidents. Decision Support Systems, 41(3), 604-615. https://doi.org/10.1016/j.dss.2004.06.005
  12. Ngai, E. W. T. et al. (2011), The application of data mining techniques in financial fraud detection : A classification framework and an academic review of literature. Decision Support Systems, 50(3), 559-569. https://doi.org/10.1016/j.dss.2010.08.006
  13. Pei, J. et al. (2001), Prefixspan : Mining sequential patterns efficiently by prefix-projected pattern growth, Paper presented at the International Conference on Knowledge Discovery in Databases and Data Mining.
  14. Potter, C. et al. (2003), Major disturbance events in terrestrial ecosystems detected using global satellite data sets. Global Change Biology, 9(7), 1005-1021. https://doi.org/10.1046/j.1365-2486.2003.00648.x
  15. Purarjomandlangrudi, A., Ghapanchi, A. H., and Esmalifalak, M. (2014), A data mining approach for fault diagnosis : An application of anomaly detection algorithm. Measurement, 55, 343-352. https://doi.org/10.1016/j.measurement.2014.05.029
  16. Rebuge, A. and Ferreira, D. R. (2012), Business process analysis in healthcare environments : A methodology based on process mining. Information Systems, 37(2), 99-116. https://doi.org/10.1016/j.is.2011.01.003
  17. Shyur, H.-J., Jou, C., and Chang, K. (2013), A data mining approach to discovering reliable sequential patterns. Journal of Systems and Software, 86(8), 2196-2203. https://doi.org/10.1016/j.jss.2013.03.105
  18. Sim, S. et al. (2012), Healthcare process pattern analysis with triage in the emergency department. Journal of the Korean Operations Research and Management Science Society, 37(4), 111-124. https://doi.org/10.7737/JKORMS.2012.37.4.111
  19. van der Aalst, W. M. P. (2011), Discovery, Conformance and Enhancement of Business Processes : Springer.
  20. van der Aalst, W. M. P. et al. (2012), Process mining manifesto, Paper presented at the Business Process Management Workshops.
  21. van der Aalst, W. M. P. et al. (2007). Business process mining : An industrial application. Information Systems, 32(5), 713-732. https://doi.org/10.1016/j.is.2006.05.003
  22. Witten, I. H., Frank, E., and Hall, M. A. (2011), Data Mining : Practical machine learning tools and techniques (3rd ed.) : Morgan Kaufmann.
  23. Yang, H. and Song, M. (2015), Analyzing Repair Processes Using Process Mining : A Case Study. Journal of the Korean Institute of Industrial Engineers, 41(1), 86-96. https://doi.org/10.7232/JKIIE.2015.41.1.086