Sciweavers

SAC
2008
ACM

Anomaly detection algorithms in logs of process aware systems

13 years 12 months ago
Anomaly detection algorithms in logs of process aware systems
Today, there is a variety of systems that support business process as a whole or partially. However, normative systems are not appropriate for some domains (e.g. health care) as a flexible support is needed to the participants. On the other hand, while it is important to support flexibility in these systems, security requirements can not be met whether these systems do not offer extra control. This paper presents and assesses two anomaly detection algorithms in logs of Process Aware Systems (PAS). The detection of an anomalous trace is based on the "noise" which a trace makes in a process model discovered by a process mining algorithm. This paper argues that these methods can support the coexistence of security and flexibility when aggregated to a PAS. Categories and Subject Descriptors H.4 [Information Systems Applications]: Miscellaneous General Terms Algorithms, Experimentation Keywords Process mining, anomaly detection, information security
Fábio de Lima Bezerra, Jacques Wainer
Added 28 Dec 2010
Updated 28 Dec 2010
Type Journal
Year 2008
Where SAC
Authors Fábio de Lima Bezerra, Jacques Wainer
Comments (0)