Skip to main content

Business Process Deviance Mining

  • Living reference work entry
  • First Online:

Synonyms

Business process anomaly detection; Business process deviation mining; Business process variants analysis

Definition

Business process deviance mining refers to the problem of (automatically) detecting and explaining deviant executions of a business process based on the historical data stored in a given Business Process Event Log (called hereinafter event log for the sake of conciseness). In this context, a deviant execution (or “deviance”) is one that deviates from the normal/desirable behavior of the process in terms of performed activities, performance measures, outcomes, or security/compliance aspects.

Usually, the given event log is regarded as a collection of process traces, encoding each the history of a single process instance, and the task amounts to spotting and analyzing the traces that likely represent deviant process (execution) instances.

In principle, this specific process mining task can help recognize, understand, and possibly prevent/reduce the occurrence of...

This is a preview of subscription content, log in via an institution.

References

  • Angiulli F, Fassetti F, Palopoli L (2009) Detecting outlying properties of exceptional objects. ACM Trans Database Syst (TODS) 34(1):7

    Article  Google Scholar 

  • Atzmueller M (2015) Subgroup discovery – advanced review. Wiley Int Rev Data Min Knowl Disc 5(1):35–49

    Google Scholar 

  • Bezerra F, Wainer J (2013) Algorithms for anomaly detection of traces in logs of process aware information systems. Inf Syst 38(1):33–44

    Article  Google Scholar 

  • Bezerra F, Wainer J, van der Aalst WM (2009) Anomaly detection using process mining. Enterp Bus Process Inf Syst Model 29:149–161

    Google Scholar 

  • Böhmer K, Rinderle-Ma S (2016) Multi-perspective anomaly detection in business process execution events. In: On the move to meaningful internet systems (OTM’16), pp 80–98

    Chapter  Google Scholar 

  • Bose RJC, van der Aalst WM (2013) Discovering signature patterns from event logs. In: 2013 IEEE symposium on computational intelligence and data mining (CIDM). IEEE, pp 111–118

    Google Scholar 

  • Conforti R, La Rosa M, ter Hofstede AH (2017) Filtering out infrequent behavior from business process event logs. IEEE Trans Knowl Data Eng 29(2):300–314

    Article  Google Scholar 

  • Cuzzocrea A, Folino F, Guarascio M, Pontieri L (2015) A multi-view learning approach to the discovery of deviant process instances. In: OTM confederated international conference on the move to meaningful internet systems. Springer, pp 146–165

    Google Scholar 

  • Cuzzocrea A, Folino F, Guarascio M, Pontieri L (2016a) A multi-view multi-dimensional ensemble learning approach to mining business process deviances. In: 2016 international joint conference on neural networks (IJCNN). IEEE, pp 3809–3816

    Google Scholar 

  • Cuzzocrea A, Folino F, Guarascio M, Pontieri L (2016b) A robust and versatile multi-view learning framework for the detection of deviant business process instances. Int J Coop Inf Syst 25(04):1740003

    Article  Google Scholar 

  • Duda RO, Hart PE, Stork DG (1973) Pattern classification. Wiley, New York

    Google Scholar 

  • Elkan C (2001) The foundations of cost-sensitive learning. In: Proceedings of 17th international joint conference on artificial intelligence (IJCAI’01), pp 973–978

    Google Scholar 

  • Fani Sani M, van der Aalst W, Bolt A, García-Algarra J (2017) Subgroup discovery in process mining. In: Proceedings of the 20th international conference on business information systems, BIS 2017, Poznan, 28–30 June 2017, vol 288. Springer, p 237

    Chapter  Google Scholar 

  • Folino F, Greco G, Guzzo A, Pontieri L (2011) Mining usage scenarios in business processes: outlier-aware discovery and run-time prediction. Data Knowl Eng 70(12):1005–1029

    Article  Google Scholar 

  • Folino F, Guarascio M, Pontieri L (2017a) A descriptive clustering approach to the analysis of quantitative business-process deviances. In: Proceedings of the 32nd ACM SIGAPP symposium on applied computing (SAC’17). ACM, pp 765–770

    Google Scholar 

  • Folino F, Guarascio M, Pontieri L (2017b) Deviance-aware discovery of high quality process models. In: Proceedings of the 29th IEEE international conference on tools with artificial intelligence (ICTAI’17), pp 724–731

    Google Scholar 

  • Ghionna L, Greco G, Guzzo A, Pontieri L (2008) Outlier detection techniques for process mining applications. Lect Notes Comput Sci 4994:150–159

    Google Scholar 

  • Hsu P-Y, Chuang Y-C, Lo Y-C, He S-C (2017) Using contextualized activity-level duration to discover irregular process instances in business operations. Inf Sci 391:80–98

    Article  Google Scholar 

  • Jalali H, Baraani A (2012) Process aware host-based intrusion detection model. Int J Commun Netw Inf Secur 4(2):117

    Google Scholar 

  • Japkowicz N, Stephen S (2002) The class imbalance problem: a systematic study. Intell Data Anal 6(5): 429–449

    Google Scholar 

  • Kang B, Kim D, Kang S-H (2012) Real-time business process monitoring method for prediction of abnormal termination using KNNI-based LOF prediction. Exp Syst Appl 39(5):6061–6068

    Article  Google Scholar 

  • Li G, van der Aalst WM (2017) A framework for detecting deviations in complex event logs. Intell Data Anal 21(4):759–779

    Article  Google Scholar 

  • Linn C, Werth D (2016) Sequential anomaly detection techniques in business processes. In: Proceedings of international conference on business information systems. Springer, pp 196–208

    Chapter  Google Scholar 

  • Lo D, Cheng H, Han J, Khoo S-C, Sun C (2009) Classification of software behaviors for failure detection: a discriminative pattern mining approach. In: Proceedings of the 15th ACM SIGKDD international conference on knowledge discovery and data mining. ACM, pp 557–566

    Google Scholar 

  • Nguyen H, Dumas M, La Rosa M, Maggi FM, Suriadi S (2014) Mining business process deviance: a quest for accuracy. In: OTM confederated international conference on the move to meaningful internet Systems. Springer, pp 436–445

    Google Scholar 

  • Nguyen H, Dumas M, La Rosa M, Maggi FM, Suriadi S (2016) Business process deviance mining: review and evaluation. arXiv preprint, arXiv:1608.08252

    Google Scholar 

  • Nolle T, Seeliger A, Mühlhäuser M (2016) Unsupervised anomaly detection in noisy business process event logs using denoising autoencoders. In: International conference on discovery science. Springer, pp 442–456

    Chapter  Google Scholar 

  • Quan L, Tian G-s (2009) Outlier detection of business process based on support vector data description. In: ISECS international colloquium on computing, communication, control, and management, CCCM 2009, vol 2. IEEE, pp 571–574

    Google Scholar 

  • Rogge-Solti A, Kasneci G (2014) Temporal anomaly detection in business processes. In: International conference on business process management. Springer, pp 234–249

    Google Scholar 

  • Rogge-Solti A, van der Aalst WM, Weske M (2013) Discovering stochastic petri nets with arbitrary delay distributions from event logs. In: Proceedings of international conference on business process management. Springer, pp 15–27

    Chapter  Google Scholar 

  • Suriadi S, Wynn MT, Ouyang C, ter Hofstede AH, van Dijk NJ (2013) Understanding process behaviours in a large insurance company in australia: a case study. In: International conference on advanced information systems engineering. Springer, pp 449–464

    Chapter  Google Scholar 

  • Swinnen J, Depaire B, Jans MJ, Vanhoof K (2012) A process deviation analysis – a case study. In: Proceedings of international conference on business process management, pp 87–98

    Chapter  Google Scholar 

  • van der Aalst WMP, De Beer HT, van Dongen BF (2005) Process mining and verification of properties: an approach based on temporal logic. In: Proceedings confederated international conference on the move to meaningful Internet systems: CoopIS, DOA, and ODBASE, pp 130–147

    Google Scholar 

  • Wang W, Zhou Z-H (2010) A new analysis of co-training. In: Proceedings of the 27th international conference on machine learning (ICML), pp 1135–1142

    Google Scholar 

  • Yang W-S, Hwang S-Y (2006) A process-mining framework for the detection of healthcare fraud and abuse. Exp Syst Appl 31(1):56–68

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Francesco Folino or Luigi Pontieri .

Editor information

Editors and Affiliations

Section Editor information

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this entry

Check for updates. Verify currency and authenticity via CrossMark

Cite this entry

Folino, F., Pontieri, L. (2018). Business Process Deviance Mining. In: Sakr, S., Zomaya, A. (eds) Encyclopedia of Big Data Technologies. Springer, Cham. https://doi.org/10.1007/978-3-319-63962-8_100-1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-63962-8_100-1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-63962-8

  • Online ISBN: 978-3-319-63962-8

  • eBook Packages: Springer Reference MathematicsReference Module Computer Science and Engineering

Publish with us

Policies and ethics