Skip to main content

Subgraph Mining for Anomalous Pattern Discovery in Event Logs

  • Conference paper
  • First Online:
New Frontiers in Mining Complex Patterns (NFMCP 2016)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 10312))

Included in the following conference series:

Abstract

Conformance checking allows organizations to verify whether their IT system complies with the prescribed behavior by comparing process executions recorded by the IT system against a process model (representing the normative behavior). However, most of the existing techniques are only able to identify low-level deviations, which provide a scarce support to investigate what actually happened when a process execution deviates from the specification. In this work, we introduce an approach to extract recurrent deviations from historical logging data and generate anomalous patterns representing high-level deviations. These patterns provide analysts with a valuable aid for investigating nonconforming behaviors; moreover, they can be exploited to detect high-level deviations during conformance checking. To identify anomalous behaviors from historical logging data, we apply frequent subgraph mining techniques together with an ad-hoc conformance checking technique. Anomalous patterns are then derived by applying frequent items algorithms to determine highly-correlated deviations, among which ordering relations are inferred. The approach has been validated by means of a set of experiments.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    \(\mathbb {B}(X)\) represents the set of all multisets over X.

  2. 2.

    http://kdmg.dii.univpm.it/?q=content/esub.

References

  1. van der Aalst, W., Adriansyah, A., van Dongen, B.: Replaying history on process models for conformance checking and performance analysis. Wiley Int. Rev. Data Min. Knowl. Discov. 2(2), 182–192 (2012)

    Article  Google Scholar 

  2. Accorsi, R., Stocker, T.: On the exploitation of process mining for security audits: the conformance checking case. In: Proceedings of Annual Symposium on Applied Computing, pp. 1709–1716. ACM (2012)

    Google Scholar 

  3. Adriansyah, A., van Dongen, B.F., Zannone, N.: Controlling break-the-glass through alignment. In: Proceedings of International Conference on Social Computing, pp. 606–611. IEEE (2013)

    Google Scholar 

  4. Alizadeh, M., de Leoni, M., Zannone, N.: History-based construction of alignments for conformance checking: formalization and implementation. In: Ceravolo, P., Russo, B., Accorsi, R. (eds.) SIMPDA 2014. LNBIP, vol. 237, pp. 58–78. Springer, Cham (2015). doi:10.1007/978-3-319-27243-6_3

    Chapter  Google Scholar 

  5. Alizadeh, M., de Leoni, M., Zannone, N.: Constructing probable explanations of nonconformity: a data-aware and history-based approach. In: Proceedings of Symposium Series on Computational Intelligence, pp. 1358–1365. IEEE (2015)

    Google Scholar 

  6. Banescu, S., Petković, M., Zannone, N.: Measuring privacy compliance using fitness metrics. In: Barros, A., Gal, A., Kindler, E. (eds.) BPM 2012. LNCS, vol. 7481, pp. 114–119. Springer, Heidelberg (2012). doi:10.1007/978-3-642-32885-5_8

    Chapter  Google Scholar 

  7. Borrego, D., Barba, I.: Conformance checking and diagnosis for declarative business process models in data-aware scenarios. Expert Syst. Appl. 41(11), 5340–5352 (2014)

    Article  Google Scholar 

  8. Jagadeesh Chandra Bose, R.P., van der Aalst, W.M.P.: Abstractions in process mining: a taxonomy of patterns. In: Dayal, U., Eder, J., Koehler, J., Reijers, H.A. (eds.) BPM 2009. LNCS, vol. 5701, pp. 159–175. Springer, Heidelberg (2009). doi:10.1007/978-3-642-03848-8_12

    Chapter  Google Scholar 

  9. Caron, F., Vanthienen, J., Baesens, B.: Comprehensive rule-based compliance checking and risk management with process mining. Decis. Support Syst. 54(3), 1357–1369 (2013)

    Google Scholar 

  10. Diamantini, C., Genga, L., Potena, D.: Esub: exploration of subgraphs. In: Proceedings of the BPM Demo Session, pp. 70–74 (2015). CEUR-WS.org

    Google Scholar 

  11. Diamantini, C., Genga, L., Potena, D.: Behavioral process mining for unstructured processes. J. Intell. Inf. Syst. 47(1), 5–32 (2016)

    Article  Google Scholar 

  12. Diamantini, C., Genga, L., Potena, D., van der Aalst, W.: Building instance graphs for highly variable processes. Expert Syst. Appl. 59, 101–118 (2016)

    Google Scholar 

  13. Greco, G., Guzzo, A., Manco, G., Saccà, D.: Mining and reasoning on workflows. IEEE Trans. Knowl. Data Eng. 17(4), 519–534 (2005)

    Google Scholar 

  14. Han, J., Pei, J., Yin, Y.: Mining frequent patterns without candidate generation. In: ACM Sigmod Record, vol. 29, pp. 1–12. ACM (2000)

    Google Scholar 

  15. Holder, L., Cook, D., Djoko, S.: Substructure discovery in the SUBDUE system. In: Proceedings of the AAAI Workshop on Knowledge Discovery in Databases, pp. 169–180 (1994)

    Google Scholar 

  16. Huang, Z., Lu, X., Duan, H.: On mining clinical pathway patterns from medical behaviors. Artif. Intell. Med. 56(1), 35–50 (2012)

    Google Scholar 

  17. Hwang, S., Wei, C., Yang, W.: Discovery of temporal patterns from process instances. Comput. Indus. 53(3), 345–364 (2004)

    Google Scholar 

  18. Jonyer, I., Cook, D., Holder, L.: Graph-based hierarchical conceptual clustering. J. Mach. Learn. Res. 2, 19–43 (2002)

    Google Scholar 

  19. Leemans, M., Aalst, W.M.P.: Discovery of frequent episodes in event logs. In: Ceravolo, P., Russo, B., Accorsi, R. (eds.) SIMPDA 2014. LNBIP, vol. 237, pp. 1–31. Springer, Cham (2015). doi:10.1007/978-3-319-27243-6_1. CEUR-ws.org

    Chapter  Google Scholar 

  20. Lu, X., Fahland, D., Aalst, W.M.P.: Conformance checking based on partially ordered event data. In: Fournier, F., Mendling, J. (eds.) BPM 2014. LNBIP, vol. 202, pp. 75–88. Springer, Cham (2015). doi:10.1007/978-3-319-15895-2_7

    Google Scholar 

  21. Rozinat, A., van der Aalst, W.M.P.: Conformance checking of processes based on monitoring real behavior. Inf. Syst. 33(1), 64–95 (2008)

    Google Scholar 

  22. Taghiabadi, E.R., Gromov, V., Fahland, D., der Aalst, W.M.P.: Compliance checking of data-aware and resource-aware compliance requirements. In: Meersman, R., Panetto, H., Dillon, T., Missikoff, M., Liu, L., Pastor, O., Cuzzocrea, A., Sellis, T. (eds.) OTM 2014. LNCS, vol. 8841, pp. 237–257. Springer, Heidelberg (2014). doi:10.1007/978-3-662-45563-0_14

    Google Scholar 

  23. Valk, R., Vidal-Naquet, G.: Petri nets and regular languages. J. Comput. Syst. Sci. 23(3), 299–325 (1981)

    Google Scholar 

Download references

Acknowledgment

This work has been partially funded by the NWO CyberSecurity programme under the PriCE project and by the Dutch national program COMMIT under the THeCS project.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Laura Genga .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Genga, L., Potena, D., Martino, O., Alizadeh, M., Diamantini, C., Zannone, N. (2017). Subgraph Mining for Anomalous Pattern Discovery in Event Logs. In: Appice, A., Ceci, M., Loglisci, C., Masciari, E., Raś, Z. (eds) New Frontiers in Mining Complex Patterns. NFMCP 2016. Lecture Notes in Computer Science(), vol 10312. Springer, Cham. https://doi.org/10.1007/978-3-319-61461-8_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-61461-8_12

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-61460-1

  • Online ISBN: 978-3-319-61461-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics