Abstract
Deviance mining is an emerging area in the field of Process Mining, with the aim of explaining the differences between normal and deviant process executions. Deviance mining approaches typically extract representative subprocesses characterizing normal/deviant behaviors from an event log and use these subprocesses as features for classification. Existing approaches mainly differ for the employed feature extraction technique and, in particular, for the representation of the patterns extracted, ranging from patterns consisting of sequence of activities to patterns explicitly representing concurrency. In this work, we perform a latitudinal study on the use of sequential and concurrency patterns in deviance mining. Comparisons between sequential and concurrency patterns is performed through experiments on two real-world event logs, by varying both classification and feature extraction algorithms. Our results show that the pattern representation has limited impact on classification performance, while the use of concurrency patterns provides more meaningful insights on deviant behavior.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
This process is a simplified and revised version of the process described in [6].
- 2.
- 3.
The log is available at https://www.win.tue.nl/bpi/doku.php?id=2012:challenge.
- 4.
The log is available at https://data.4tu.nl/repository.
- 5.
Note that the concurrency feature set comprises both sequential and concurrency patterns.
References
van der Aalst, W.: Process Mining: Discovery Conformance and Enhancement of Business Processes. Springer, Berlin (2011)
van Beest, N.R., Dumas, M., García-Bañuelos, L., La Rosa, M.: Log delta analysis: interpretable differencing of business process event logs. Business Process Management. LNCS, vol. 9253, pp. 386–405. Springer, Berlin (2015)
Bose, R., van der Aalst, W.: Abstractions in process mining: a taxonomy of patterns. Business Process Management. LNCS, vol. 5701, pp. 159–175. Springer, Berlin (2009)
Bose, R., van der Aalst, W.: Trace clustering based on conserved patterns: towards achieving better process models. Business Process Management, pp. 170–181. Springer, Berlin (2009)
Bose, R., van der Aalst, W.: Discovering signature patterns from event logs. In: Proceedings of Computational Intelligence and Data Mining, pp. 111–118. IEEE (2013)
vanden Broucke, S.K., Munoz-Gama, J., Carmona, J., Baesens, B., Vanthienen, J.: Event-based real-time decomposed conformance analysis. In: OTM Confederated International Conferences, pp. 345–363. Springer (2014)
Chandrashekar, G., Sahin, F.: A survey on feature selection methods. Comput. Electr. Eng. 40(1), 16–28 (2014)
Chen, N., Hoi, S.C., Xiao, X.: Software process evaluation: a machine learning approach. In: Proceedings of International Conference on Automated Software Engineering, pp. 333–342. IEEE (2011)
Cuzzocrea, A., Folino, F., Guarascio, M., Pontieri, L.: A multi-view learning approach to the discovery of deviant process instances. In: OTM Confederated International Conferences, pp. 146–165. Springer (2015)
Diamantini, C., Genga, L., Potena, D., van der Aalst, W.: Building instance graphs for highly variable processes. Expert Syst. Appl. 59, 101–118 (2016)
Domingos, P.: MetaCost: a general method for making classifiers cost-sensitive. In: Proceedings of International Conference on Knowledge Discovery and Data Mining, pp. 155–164. ACM (1999)
Genga, L., Zannone, N.: Towards a systematic process-aware behavioral analysis for security. In: Proceedings of International Joint Conference on e-Business and Telecommunications, vol. 1, pp. 26–28. SciTePress (2018)
Genga, L., Diamantini, C., Potena, D., Zannone, N.: Deviance mining with concurrency. In: Proceedings of International Workshop on New Frontiers in Mining Complex Patterns (2018)
Greco, G., Guzzo, A., Manco, G., Saccà, D.: Mining unconnected patterns in workflows. Inf. Syst. 32(5), 685–712 (2007)
Hall, M.A.: Correlation-based feature selection for machine learning. Ph.D. thesis (1999)
Han, J., Pei, J., Kamber, M.: Data Mining: Concepts and Techniques. Morgan Kaufmann, Waltham (2012)
Hwang, S.Y., Wei, C.P., Yang, W.S.: Discovery of temporal patterns from process instances. Comput. Ind. 53(3), 345–364 (2004)
Jiang, C., Coenen, F., Zito, M.: A survey of frequent subgraph mining algorithms. Knowl. Eng. Rev. 28(1), 75–105 (2013)
Jonyer, I., Cook, D., Holder, L.: Graph-based hierarchical conceptual clustering. J. Mach. Learn. Res. 2, 19–43 (2002)
Kuramochi, M., Karypis, G.: An efficient algorithm for discovering frequent subgraphs. IEEE Trans. Knowl. Data Eng. 16(9), 1038–1051 (2004)
Leemans, M., van der Aalst, W.: Discovery of frequent episodes in event logs. In: Proceedings of International Symposium on Data-Driven Process Discovery and Analysis, pp. 1–31. CEUR-ws.org (2014)
Lo, D., Cheng, H., Han, J., Khoo, S.C., Sun, C.: Classification of software behaviors for failure detection: a discriminative pattern mining approach. In: Proceedings of International Conference on Knowledge Discovery and Data Mining, pp. 557–566. ACM (2009)
Mannhardt, F., Blinde, D.: Analyzing the trajectories of patients with sepsis using process mining. In: Proceedings of RADAR+EMISA, vol. 1859, pp. 72–80. CEUR-ws.org (2017)
Molina, L.C., Belanche, L., Nebot, À.: Feature selection algorithms: a survey and experimental evaluation. In: Proceedings of International Conference on Data Mining, pp. 306–313. IEEE (2002)
Nguyen, H., Dumas, M., La Rosa, M., Maggi, F.M., Suriadi, S.: Mining business process deviance: a quest for accuracy. In: OTM Confederated International Conferences, pp. 436–445. Springer (2014)
Sun, C., Du, J., Chen, N., Khoo, S.C., Yang, Y.: Mining explicit rules for software process evaluation. In: Proceedings of International Conference on Software and System Process, pp. 118–125. ACM (2013)
Suriadi, S., Wynn, M.T., Ouyang, C., ter Hofstede, A.H., van Dijk, N.J.: Understanding process behaviours in a large insurance company in Australia: a case study. Advanced Information Systems Engineering. LNCS, vol. 7908, pp. 449–464. Springer, Berlin (2013)
Tax, N., Genga, L., Zannone, N.: On the use of hierarchical subtrace mining for efficient local process model mining. In: Proceedings of International Symposium on Data-Driven Process Discovery and Analysis, CEUR Workshop Proceedings, vol. 2016, pp. 8–22. CEUR-WS.org (2017)
Acknowledgements
This work is partially supported by ITEA3 through the APPSTACLE project (15017) and by the RSA-B project SeCludE.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Genga, L., Potena, D., Chiorrini, A., Diamantini, C., Zannone, N. (2020). A Latitudinal Study on the Use of Sequential and Concurrency Patterns in Deviance Mining. In: Appice, A., Ceci, M., Loglisci, C., Manco, G., Masciari, E., Ras, Z. (eds) Complex Pattern Mining. Studies in Computational Intelligence, vol 880. Springer, Cham. https://doi.org/10.1007/978-3-030-36617-9_7
Download citation
DOI: https://doi.org/10.1007/978-3-030-36617-9_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-36616-2
Online ISBN: 978-3-030-36617-9
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)