Skip to main navigation Skip to search Skip to main content

Multi instance anomaly detection in business process executions

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

19 Scopus citations

Abstract

Processes control critical IT systems and business cases in dynamic environments. Hence, ensuring secure model executions is crucial to prevent misuse and attacks. In general, anomaly detection approaches can be employed to tackle this challenge. Existing ones analyze each process instance individually. Doing so does not consider attacks that combine multiple instances, e.g., by splitting fraudulent fund transactions into multiple instances with smaller “unsuspi-cious” amounts. The proposed approach aims at detecting such attacks. For this, anomalies between the temporal behavior of a set of historic instances (ex post) and the temporal behavior of running instances are identified. Here, temporal behavior refers to the temporal order between the instances and their events. The proposed approach is implemented and evaluated based on real life process logs from different domains and artificial anomalies.

Original languageEnglish
Title of host publicationBusiness Process Management - 15th International Conference, BPM 2017, Proceedings
EditorsAlexandru Baltag, Jeremy Seligman, Tomoyuki Yamada
PublisherSpringer Verlag
Pages77-93
Number of pages17
ISBN (Print)9783319649993
DOIs
StatePublished - 2017
Externally publishedYes
Event15th International Conference on Business Process Management, BPM 2017 - Barcelona, Spain
Duration: 10 Sep 201715 Sep 2017

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume10445 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference15th International Conference on Business Process Management, BPM 2017
Country/TerritorySpain
CityBarcelona
Period10/09/1715/09/17

Keywords

  • Multiple instances
  • Runtime anomaly detection
  • Secure business processes
  • Temporal anomalies

Fingerprint

Dive into the research topics of 'Multi instance anomaly detection in business process executions'. Together they form a unique fingerprint.

Cite this