Subgraph Mining for Anomalous Pattern Discovery in Event Logs

Conformance checking allows organizations to verify whether their IT system complies with the prescribed behavior by comparing process executions recorded by the IT system against a process model (representing the normative behavior). However, most of the existing techniques are only able to identify low-level deviations, which provide a scarce support to investigate what actually happened when a process execution deviates from the specification. In this work, we introduce an approach to extract recurrent deviations from historical logging data and generate anomalous patterns representing high-level deviations. These patterns provide analysts with a valuable aid for investigating nonconforming behaviors; moreover, they can be exploited to detect high-level deviations during conformance checking. To identify anomalous behaviors from historical logging data, we apply frequent subgraph mining techniques together with an ad-hoc conformance checking technique. Anomalous patterns are then derived by applying frequent items algorithms to determine highly-correlated deviations, among which ordering relations are inferred. The approach has been validated by means of a set of experiments.

[1]  Claudia Diamantini,et al.  Behavioral process mining for unstructured processes , 2016, Journal of Intelligent Information Systems.

[2]  Massimiliano de Leoni,et al.  History-Based Construction of Alignments for Conformance Checking: Formalization and Implementation , 2014, SIMPDA.

[3]  Huilong Duan,et al.  On mining clinical pathway patterns from medical behaviors , 2012, Artif. Intell. Medicine.

[4]  Chih-Ping Wei,et al.  Discovery of temporal patterns from process instances , 2004, Comput. Ind..

[5]  Bart Baesens,et al.  Comprehensive rule-based compliance checking and risk management with process mining , 2013, Decis. Support Syst..

[6]  Boudewijn F. van Dongen,et al.  Replaying history on process models for conformance checking and performance analysis , 2012, WIREs Data Mining Knowl. Discov..

[7]  Wil M.P. van der Aalst,et al.  Discovery of Frequent Episodes in Event Logs , 2014, SIMPDA.

[8]  Rafael Accorsi,et al.  On the exploitation of process mining for security audits: the conformance checking case , 2012, SAC '12.

[9]  Boudewijn F. van Dongen,et al.  Controlling Break-the-Glass through Alignment , 2013, 2013 International Conference on Social Computing.

[10]  Wil M. P. van der Aalst,et al.  Conformance checking of processes based on monitoring real behavior , 2008, Inf. Syst..

[11]  Rüdiger Valk,et al.  Petri Nets and Regular Languages , 1981, J. Comput. Syst. Sci..

[12]  Alain Finkel,et al.  The Minimal Coverability Graph for Petri Nets , 1991, Applications and Theory of Petri Nets.

[13]  Claudia Diamantini,et al.  ESub: Exploration of Subgraphs. A tool for exploring models generated by Graph Mining algorithms , 2015, BPM.

[14]  Wil M. P. van der Aalst,et al.  Abstractions in Process Mining: A Taxonomy of Patterns , 2009, BPM.

[15]  Dirk Fahland,et al.  Conformance Checking Based on Partially Ordered Event Data , 2014, Business Process Management Workshops.

[16]  Nicola Zannone,et al.  Measuring Privacy Compliance Using Fitness Metrics , 2012, BPM.

[17]  Massimiliano de Leoni,et al.  Constructing Probable Explanations of Nonconformity: A Data-Aware and History-Based Approach , 2015, 2015 IEEE Symposium Series on Computational Intelligence.

[18]  Wil M. P. van der Aalst,et al.  Building instance graphs for highly variable processes , 2016, Expert Syst. Appl..

[19]  Dirk Fahland,et al.  Compliance Checking of Data-Aware and Resource-Aware Compliance Requirements , 2014, OTM Conferences.

[20]  Lawrence B. Holder,et al.  Substucture Discovery in the SUBDUE System , 1994, KDD Workshop.

[21]  Irene Barba,et al.  Conformance checking and diagnosis for declarative business process models in data-aware scenarios , 2014, Expert Syst. Appl..

[22]  D. Cook,et al.  Graph-based hierarchical conceptual clustering , 2002 .

[23]  Jian Pei,et al.  Mining frequent patterns without candidate generation , 2000, SIGMOD '00.

[24]  Domenico Saccà,et al.  Mining and reasoning on workflows , 2005, IEEE Transactions on Knowledge and Data Engineering.