Anomaly Detection Based on Control-flow Pattern of Parallel Business Processes

Hendra Darmawan, Riyanarto Sarno, Adhatus Solichah Ahmadiyah, Kelly Rossa Sungkono, Cahyaningtyas Sekar Wahyuni

Abstract


Company must have an audit trail that captures activities executed, named an event log. In executing the process, there are certain gap between what is expected and what is executed, called an anomaly. Anomaly have to be evaluated so it does not harm the company. Process mining is implemented to model actual workflow. Anomaly contained in the event log caused the low fitness and precision value. In this research, trace clustering is implemented to group the same trace into one cluster. Then, data filtering is done to filter traces which have a low frequency value. After that, the event log is modeled to form a new business process. The filtered business process model has higher fitness and precison value compared to unfiltered business process. The fitness and precision of unfiltered process model is 1 and 0.6446991. Meanwhile, the fitness and precision of filtered process model is 1 and 0.81481093.

Keywords


Anomaly Data Filtering; Graph Database; Control-Flow Pattern; Process Discovery

References


R. Sarno, K. R. Sungkono. Coupled Hidden Markov Model for Process Mining of Invisible Prime Tasks. International Review Computers and Software (IRECOS). 2016; 11(6): 539-547. http://dx.doi.org/10.15866/irecos.v11i6.9555

N. Y. Setiawan, R. Sarno. Multi-criteria Decision Making for Selecting Semantic Web Service Considering Variability and Complexity Trade-off. Journal of Theoretical and Applied Information Technology. 2016; 86(2). pp. 316-326.

Mekhala. A Review Paper on Process Mining. International Journal of Engineering and Techniques. 2015; 1(4), pp. 11-17.

W. M. P. van der Aalst, T. Weijters and L. Maruster. Workflow mining: discovering process models from event logs. IEEE Transactions on Knowledge and Data Engineering. 2004; 16(9): 1128-1142. http://doi.org/10.1109/TKDE.2004.47

A. J. M. M. Weijters, W. M. P. van der Aalst and A. A. K. Medeiros. Process mining with the Heuristics Miner-algorithm. Eindhoven: Eindhoven University of Technology, 2006.

R. Sarno, F. Haryadita, D. Sunaryono and A. Munif. Model Discovery of Parallel Business Processes using Modified Heuristic Miner. International Conference on Science in Information Technology (ICSITech). Yogyakarta. 2015; 30-35. https://doi.org/10.1109/icsitech.2015.7407772

Hermawan, R. Sarno. A More Efficient Deterministic Algorithm for Process Model Discovery. International Journal of Innovative Computing, Information and Control (IJICIC). 2018; 14(3): 971-995. http://doi.org/10.24507/ijicic.14.03.971

R. Sarno, K. R. Sungkono. Coupled Hidden Markov Model for Process Mining of Non-Free Choice and Invisible Prime Tasks. Procedia Computer Science. 2018; 124: 134-141. https://doi.org/10.1016/j.procs.2017.12.139

R. Sarno, K. R. Sungkono. Hidden Markov Model for Process Mining of Parallel Business Processes. International Review on Computer and Software (IRECOS). 2016; 11(4): 290-300. http://dx.doi.org/10.15866/irecos.v11i4.8700

A. A. K. Medeiros, W. M. P. van der Aalst, A. J. M. M. Weijters. Workflow Mining: Current Status and Future Directions. On The Move to Meaningful Internet Systems 2003: CoopIS, DOA, and ODBASE. OTM 2003. Catania. 2003; 389-406. https://doi.org/10.1007/978-3-540-39964-3_25

A. A. K. Medeiros, B. F. van Dongen, W. M. P. van der Aalst, A. J. M. M. Weijters. Process mining : extending the alpha-algorithm to mine short loops. Technische Universiteit Eindhoven. Eindhoven. 2004.

L. Wen, W. M. P. van der Aalst, J. Wang, J. Sun. Mining Process Models with Non-Free-Choice Constructs. Data Mining and Knowledge Discovery. 2007; 15(2): 145-180. https://doi.org/10.1007/s10618-007-0065-y

L. Wen, W. M. P. van der Aalst, B. Huang, J. Sun. Mining process models with prime invisible tasks. Data & Knowledge Engineering. 2010; 69(10) 999-1021. https://doi.org/10.1016/j.datak.2010.06.001

Q. Guo, L. Wen, J. Wang, Z. Yan, P. S. Yu. Mining Invisible Tasks in Non-free-choice Constructs. Business Process Management. BPM 2016. Rio de Janeiro. 2015; 109-125. https://doi.org/10.1007/978-3-319-23063-4_7

I. Robinson, J. Webber, E. Eifrem. Graph Database: New Opportunities for Connected Data. Amerika Serikat: O'Reilly Media, Inc; 2015.

R. Sarno, K. R. Sungkono and R. Septiarakhman, "Graph-Based Approach for Modeling and Matching Parallel Business Processes," International Information Institute. 2018; 21(5): 1603-1614.

I. Robinson, J. Webber and E. Eifrem, Graph Databases: New Opportunities for Connected Data, 2nd ed., O'Reilly Media, Inc., 2015.

N. Francis, A. Taylor, A. Green, P. Guagliardo, L. Libkin, T. Lindaaker, V. Marsault, S. Plantikow, M. Rydberg, P. Selmer. Cypher: An Evolving Query Language for Property Graphs. SIGMOD '18 Proceedings of the 2018 International Conference on Management of Data. Houston. 2018; 1433-1445.

http://doi.org/10.1145/3183713.3190657




DOI: http://dx.doi.org/10.12928/telkomnika.v16i6.10568

Refbacks

  • There are currently no refbacks.


Copyright (c) 2018 Universitas Ahmad Dahlan

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.


TELKOMNIKA Telecommunication, Computing, Electronics and Control
website: http://telkomnika.ee.uad.ac.id
online system: http://journal.uad.ac.id/index.php/TELKOMNIKA
Phone: +62 (274) 563515, 511830, 379418, 371120 ext: 3208
Fax    : +62 (274) 564604

View TELKOMNIKA Stats