File Download

There are no files associated with this item.

  • Find it @ UNIST can give you direct access to the published full text of this article. (UNISTARs only)
Related Researcher

MarcoComuzzi

Comuzzi, Marco
Intelligent Enterprise Lab.
Read More

Views & Downloads

Detailed Information

Cited time in webofscience Cited time in scopus
Metadata Downloads

Detecting and repairing anomaly patterns in business process event logs

Author(s)
Ko, JonghyeonComuzzi, MarcoMaggi, Fabrizio Maria
Issued Date
2025-11
DOI
10.1016/j.datak.2025.102488
URI
https://scholarworks.unist.ac.kr/handle/201301/87520
Citation
DATA & KNOWLEDGE ENGINEERING, v.160, pp.102488
Abstract
Event log anomaly detection and log repairing concern the identification of anomalous traces in an event log and the reconstruction of a correct trace for the anomalous ones, respectively. Trace-level anomalies in event logs often appear according to specific patterns, such events inserted, repeated, or skipped. This paper proposes P-BEAR (Pattern-Based Event Log Anomaly Reconstruction), a semi-supervised pattern-based anomaly detection and log repairing approach that exploits the pattern-based nature of trace-level anomalies in event logs. P-BEAR captures, in a set of ad-hoc graphs, the behaviour of clean traces in a log and uses these to identify anomalous traces, determine the specific anomaly pattern that applies to them, and then reconstruct the correct trace. The proposed approach is evaluated using artificial and real event logs against traditional trace alignment in conformance checking, the edit distance-based alignment method, and an unsupervised method based on deep learning. Overall, the proposed method outperforms the alignment method in anomalous trace reconstruction while providing interpretability with respect to anomaly pattern classification. P-BEAR is also quicker to execute, and its performance is more balanced across different types of anomaly patterns.
Publisher
ELSEVIER
ISSN
0169-023X
Keyword (Author)
Business processMining methods and algorithmsEvent log qualityAnomaly patternAnomaly reconstruction

qrcode

Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.