Discovering anomalous frequent patterns from partially ordered event logs

Conformance checking allows organizations to compare process executions recorded by the IT system against a process model representing the normative behavior. Most of the existing techniques, however, are only able to pinpoint where individual process executions deviate from the normative behavior, without considering neither possible correlations among occurred deviations nor their frequency. Moreover, the actual control-flow of the process is not taken into account in the analysis. Neglecting possible parallelisms among process activities can lead to inaccurate diagnostics; it also poses some challenges in interpreting the results, since deviations occurring in parallel behaviors are often instantiated in different sequential behaviors in different traces. In this work, we present an approach to extract anomalous frequent patterns from historical logging data. The extracted patterns can exhibit parallel behaviors and correlate recurrent deviations that have occurred in possibly different portions of the process, thus providing analysts with a valuable aid for investigating nonconforming behaviors. Our approach has been implemented as a plug-in of the ESub tool and evaluated using both synthetic and real-life logs.

[1]  Wil M. P. van der Aalst,et al.  Process Mining Applied to the BPI Challenge 2012: Divide and Conquer While Discerning Resources , 2012, Business Process Management Workshops.

[2]  Wil M. P. van der Aalst,et al.  Abstractions in Process Mining: A Taxonomy of Patterns , 2009, BPM.

[3]  Claudia Diamantini,et al.  Subgraph Mining for Anomalous Pattern Discovery in Event Logs , 2016, NFMCP@PKDD/ECML.

[4]  Julian R. Ullmann,et al.  An Algorithm for Subgraph Isomorphism , 1976, J. ACM.

[5]  Bart Baesens,et al.  Comprehensive rule-based compliance checking and risk management with process mining , 2013, Decis. Support Syst..

[6]  Wil M. P. van der Aalst,et al.  Heuristic approaches for generating Local Process Models through log projections , 2016, 2016 IEEE Symposium Series on Computational Intelligence (SSCI).

[7]  Claudia Diamantini,et al.  ESub: Exploration of Subgraphs. A tool for exploring models generated by Graph Mining algorithms , 2015, BPM.

[8]  Dirk Fahland,et al.  Model repair - aligning process models to reality , 2015, Inf. Syst..

[9]  Horst Bunke,et al.  A New Algorithm for Error-Tolerant Subgraph Isomorphism Detection , 1998, IEEE Trans. Pattern Anal. Mach. Intell..

[10]  Lawrence B. Holder,et al.  Substucture Discovery in the SUBDUE System , 1994, KDD Workshop.

[11]  Douglas C. Schmidt,et al.  A Fast Backtracking Algorithm to Test Directed Graphs for Isomorphism Using Distance Matrices , 1976, J. ACM.

[12]  Irene Barba,et al.  Conformance checking and diagnosis for declarative business process models in data-aware scenarios , 2014, Expert Syst. Appl..

[13]  Wil M. P. van der Aalst,et al.  Discovering Hierarchical Process Models Using ProM , 2011, CAiSE Forum.

[14]  George Karypis,et al.  GREW - a scalable frequent subgraph discovery algorithm , 2004, Fourth IEEE International Conference on Data Mining (ICDM'04).

[15]  Takashi Washio,et al.  An Apriori-Based Algorithm for Mining Frequent Substructures from Graph Data , 2000, PKDD.

[16]  Danai Koutra,et al.  Graph based anomaly detection and description: a survey , 2014, Data Mining and Knowledge Discovery.

[17]  Niek Tax,et al.  Unsupervised Event Abstraction using Pattern Abstraction and Local Process Models , 2017, RADAR+EMISA@CAiSE.

[18]  Boudewijn F. van Dongen,et al.  Replaying history on process models for conformance checking and performance analysis , 2012, WIREs Data Mining Knowl. Discov..

[19]  Domenico Saccà,et al.  Mining unconnected patterns in workflows , 2007, Inf. Syst..

[20]  Nicola Zannone,et al.  Measuring Privacy Compliance Using Fitness Metrics , 2012, BPM.

[21]  Jiong Yang,et al.  SPIN: mining maximal frequent subgraphs from graph databases , 2004, KDD.

[22]  Massimiliano de Leoni,et al.  Constructing Probable Explanations of Nonconformity: A Data-Aware and History-Based Approach , 2015, 2015 IEEE Symposium Series on Computational Intelligence.

[23]  van der Wmp Wil Aalst,et al.  Decomposing conformance checking on Petri nets with data , 2014 .

[24]  Marlon Dumas,et al.  Log Delta Analysis: Interpretable Differencing of Business Process Event Logs , 2015, BPM.

[25]  Wil M.P. van der Aalst,et al.  Discovery of Frequent Episodes in Event Logs , 2014, SIMPDA.

[26]  J. Mendling,et al.  APD tool : Mining Anomalous Patterns from Event Logs , 2017 .

[27]  Boudewijn F. van Dongen,et al.  Workflow mining: A survey of issues and approaches , 2003, Data Knowl. Eng..

[28]  Boudewijn F. van Dongen,et al.  Translating Message Sequence Charts to other Process Languages Using Process Mining , 2008, Trans. Petri Nets Other Model. Concurr..

[29]  Sander J. J. Leemans,et al.  Discovering Block-Structured Process Models from Event Logs - A Constructive Approach , 2013, Petri Nets.

[30]  Lawrence B. Holder,et al.  Insider Threat Detection Using a Graph-Based Approach , 2010 .

[31]  Dirk Fahland,et al.  Conformance Checking Based on Partially Ordered Event Data , 2014, Business Process Management Workshops.

[32]  Dirk Fahland,et al.  Detecting Deviating Behaviors Without Models , 2015, Business Process Management Workshops.

[33]  Dirk Fahland Translating UML2 Activity Diagrams to Petri Nets , 2008 .

[34]  Boudewijn F. van Dongen,et al.  Conformance Checking Using Cost-Based Fitness Analysis , 2011, 2011 IEEE 15th International Enterprise Distributed Object Computing Conference.

[35]  Luigi Pontieri,et al.  Mining taxonomies of process models , 2008, Data Knowl. Eng..

[36]  Chih-Ping Wei,et al.  Discovery of temporal patterns from process instances , 2004, Comput. Ind..

[37]  Boudewijn F. van Dongen,et al.  Controlling Break-the-Glass through Alignment , 2013, 2013 International Conference on Social Computing.

[38]  Dirk Fahland,et al.  Conformance checking in healthcare based on partially ordered event data , 2014, Proceedings of the 2014 IEEE Emerging Technology and Factory Automation (ETFA).

[39]  Wil M. P. van der Aalst,et al.  Conformance checking of processes based on monitoring real behavior , 2008, Inf. Syst..

[40]  George Karypis,et al.  Frequent subgraph discovery , 2001, Proceedings 2001 IEEE International Conference on Data Mining.

[41]  Wil M. P. van der Aalst,et al.  Building instance graphs for highly variable processes , 2016, Expert Syst. Appl..

[42]  Dirk Fahland,et al.  Compliance Checking of Data-Aware and Resource-Aware Compliance Requirements , 2014, OTM Conferences.

[43]  Jan Mendling,et al.  From business process models to process-oriented software systems , 2009, TSEM.

[44]  Massimiliano de Leoni,et al.  History-Based Construction of Alignments for Conformance Checking: Formalization and Implementation , 2014, SIMPDA.

[45]  Huilong Duan,et al.  On mining clinical pathway patterns from medical behaviors , 2012, Artif. Intell. Medicine.

[46]  D. Cook,et al.  Graph-based hierarchical conceptual clustering , 2002 .

[47]  Wil M. P. van der Aalst,et al.  Process Mining , 2016, Springer Berlin Heidelberg.

[48]  Jian Pei,et al.  Mining frequent patterns without candidate generation , 2000, SIGMOD '00.

[49]  Domenico Saccà,et al.  Mining and reasoning on workflows , 2005, IEEE Transactions on Knowledge and Data Engineering.

[50]  Dirk Fahland,et al.  Where Did I Misbehave? Diagnostic Information in Compliance Checking , 2012, BPM.

[51]  Wil M. P. van der Aalst,et al.  Decomposing Petri nets for process mining: A generic approach , 2013, Distributed and Parallel Databases.

[52]  Jcam Joos Buijs,et al.  Mining process performance from event logs : the BPI Challenge 2012 case study , 2012 .

[53]  Josep Carmona,et al.  Event-Based Real-Time Decomposed Conformance Analysis , 2014, OTM Conferences.

[54]  Frans Coenen,et al.  A survey of frequent subgraph mining algorithms , 2012, The Knowledge Engineering Review.

[55]  Kamalakar Karlapalem,et al.  MARGIN: Maximal Frequent Subgraph Mining , 2006, Sixth International Conference on Data Mining (ICDM'06).