Computer Science ›› 2026, Vol. 53 ›› Issue (2): 207-215.doi: 10.11896/jsjkx.241200037

• Database & Big Data & Data Science • Previous Articles     Next Articles

Anomaly Detection and Repair Methods for Dynamic Adjustment of Business Process

LIU Fujie, FANG Xianwen   

  1. College of Mathematics and Big Data,Anhui University of Science and Technology,Huainan,Anhui 232001,China
  • Received:2024-12-04 Revised:2025-03-18 Published:2026-02-10
  • About author:LIU Fujie,born in 2000,postgraduate.Her main research interests include Petri nets and process mining.
    FANG Xianwen,born in 1975,Ph.D,professor.His main research interests include Petri nets and trusted computing.
  • Supported by:
    National Natural Science Foundation of China(61572035),Key Research and Development Program of Anhui Province(2022a05020005) and Natural Science Foundation of Anhui Province(Joint Fund for Water Science,2308085US11).

Abstract: In the wave of digital transformation,the anomaly detection and repair of business processes are crucial for ensuring the operational efficiency and decision-making quality of enterprises.Meanwhile,higher requirements are put forward for its detection and repair technologies.Traditional anomaly detection methods can no longer meet the needs of real-time monitoring and adaptive adjustment of current business processes.Most of the existing methods focus on static analysis and do not fully consider the complexity and variability of the business environment,so it is difficult to adapt to the needs of dynamic changes in processes.Based on this,this paper innovatively proposes the AAHM.This method improves the accuracy of anomaly detection and the effectiveness of repair through dynamic parameter adjustment and real-time data feedback.To verify the effectiveness of this me-thod,four groups of real event logs are used for simulation in the experiment.The results show that this method can effectively identify and repair abnormal behaviors and restore the normal execution of business processes through feature vector completion and behavior repair strategies.In addition,through post hoc test analysis of the experimental results,the effectiveness and rationality of the proposed method are further verified.

Key words: Process mining, Anomaly detection, Adaptive method, Abnormal repair, Post hoc test

CLC Number: 

  • TP391
[1]SARNO R,SINAGA F,SUNGKONO K R.Anomaly detection in business processes using process mining and fuzzy association rule learning[J].Journal of Big Data,2020,7(1):5.
[2]VAN ZELST S J,SANI M F,OSTOVAR A,et al.Detection and removal of infrequent behavior from event streams of business processes[J].Information Systems,2020,90:101451.
[3]KRAJSIC P,FRANCZYK B.Catch me if you can:online classification for near real-time anomaly detection in business process event streams[J].Procedia Computer Science,2022,207:235-244.
[4]GUAN W,CAO J,GU Y,et al.GAMA:A multi-graph-based anomaly detection framework for business processes via graph neural networks[J].Information Systems,2024,124:102405.
[5]NOLLE T,LUETTGEN S,SEELIGER A,et al.Binet:Multi-perspective business process anomaly classification[J].Information Systems,2022,103:101458.
[6]KO J,COMUZZI M.Keeping our rivers clean:Information-theoretic online anomaly detection for streaming business process events[J].Information Systems,2022,104:101894.
[7]BÖHMER K,RINDERLE-MA S.Multi-perspective anomaly detection in business process execution events[C]//On the Move to Meaningful Internet Systems:OTM 2016 Conferences.Springer,2016:80-98.
[8]NOLLE T,LUETTGEN S,SEELIGER A,et al.Analyzing business process anomalies using autoencoders[J].Machine Lear-ning,2018,107:1875-1893.
[9]KRAJSIC P,FRANCZYK B.Variational Autoencoder forAnomaly Detection in Event Data in Online Process Mining[C]//ICEIS.2021:567-574.
[10]KRAJSIC P,FRANCZYK B.Semi-supervised anomaly detection in business process event data using self-attention based classification[J].Procedia Computer Science,2021,192:39-48.
[11]NGUYEN H T C,LEE S,KIM J,et al.Autoencoders for improving quality of process event logs[J].Expert Systems with Applications,2019,131:132-147.
[12]TAVARES G M,JUNIOR S B.Process miningencoding via meta-learning for an enhanced anomaly detection[C]//Proceedings of European Conference on Advances in Databases and Information Systems.Cham:Springer,2021:157-168.
[13]BÖHMER K,RINDERLE-MA S.Mining association rules foranomaly detection indynamic process runtime behavior and explaining the root cause to users[J].Information Systems,2020,90:101438.
[14]FANI SANI M,VAN ZELST S J,VAN DER AALST W M P.Repairing outlier behaviour in event logs[C]//Business Information Systems:21st International Conference,BIS 2018.Cham:Springer,2018:115-131.
[15]FANI SANI M,VAN ZELST S J,VAN DER AALST W M P.Applying sequence mining for outlier detection in process mining[C]//On the Move to Meaningful Internet Systems.OTM 2018 Conferences.Cham:Springer,2018:98-116.
[16]GUO H C,GUO Y H,YANG J,et al.Loglg:Weakly supervised log anomaly detection via log-event graph construction[C]//Proceedings of International Conference on Database Systems for Advanced Applications.Cham:Springer,2023:490-501.
[17]MEHR A S M,DE CARVALHO R M,VAN DONGEN B.Explainable conformance checking:understanding patterns of anomalous behavior[J].Engineering Applications of Artificial Intelligence,2023,126:106827.
[18]LEE S,LU X,REIJERS H A.The analysis of online eventstreams:Predicting the next activity for anomaly detection[C]//Proceedings of International Conference on Research Challenges in Information Science.Cham:Springer,2022:248-264.
[19]ZAVATTERI M,BRESOLIN D,DE LEONI M.Repair of unsound data-aware process models[C]//Proceedings of International Conference on Business Process Management.Cham:Springer,2023:383-395.
[20]CONFORTI R,LA ROSA M,TER HOFSTEDE A H M,et al.Automatic repair of same-timestamp errors in business process event logs[C]//Business Process Management:18th International Conference,BPM 2020.Cham:Springer,2020:327-345.
[21]GUAN W,CAO J,GU Y,et al.AIMED:An automatic and incremental approach for business process model repair under concept drift[J].Information Systems,2023,119:102285.
[22]FANG H,LIU W C G,WANG W S,et al.Discovery of process variants based on trace context tree[J].Connection Science,2023,35(1):2190499.
[23]MASUYAMA N,AMAKO N,YAMADA Y,et al.Adaptiveresonance theory-based topological clustering with a divisive hierarchical structure capable of continual learning[J].IEEE Access,2022,10:68042-68056.
[24]LEI S.A feature selection method based on information gain and genetic algorithm[C]//International Conference on Computer Science and Electronics Engineering.IEEE,2012:355-358.
[1] XU Jingtao, YANG Yan, JIANG Yongquan. Time-Frequency Attention Based Model for Time Series Anomaly Detection [J]. Computer Science, 2026, 53(2): 161-169.
[2] TANG Chenghai, YANG Yuqing, YANG Haifeng, CAI Jianghui, ZHOU Lichan. Adaptive Data Stream Anomaly Detection Algorithm Based on Variable Density [J]. Computer Science, 2026, 53(2): 216-226.
[3] HAN Lei, SHANG Haoyu, QIAN Xiaoyan, GU Yan, LIU Qingsong, WANG Chuang. Constrained Multi-loss Video Anomaly Detection with Dual-branch Feature Fusion [J]. Computer Science, 2026, 53(2): 236-244.
[4] WANG Cheng, JIN Cheng. KAN-based Unsupervised Multivariate Time Series Anomaly Detection Network [J]. Computer Science, 2026, 53(1): 89-96.
[5] SU Shiyu, YU Jiong, LI Shu, JIU Shicheng. Cross-domain Graph Anomaly Detection Via Dual Classification and Reconstruction [J]. Computer Science, 2025, 52(8): 374-384.
[6] GU Zhaojun, YANG Xueying, SUI He. Improved SVM Model for Industrial Control Anomaly Detection Based on InterferenceSample Distribution Optimization [J]. Computer Science, 2025, 52(7): 388-398.
[7] YIN Wencui, XIE Ping, YE Chengxu, HAN Jiaxin, XIA Xing. Anomaly Detection of Multi-variable Time Series Data Based on Variational Graph Auto-encoders [J]. Computer Science, 2025, 52(6A): 240700124-8.
[8] LIAO Sirui, HUANG Feihu, ZHAN Pengxiang, PENG Jian, ZHANG Linghao. DCDAD:Differentiated Context Dependency for Time Series Anomaly Detection Method [J]. Computer Science, 2025, 52(6): 106-117.
[9] YAN Tingju, CAO Yan, WANG Yijing. Low-power Bluetooth Spoofing Attack Detection Technology Based on RFFAD_DeepSVDD [J]. Computer Science, 2025, 52(2): 380-387.
[10] YUAN Ye, CHEN Ming, WU Anbiao, WANG Yishu. Graph Anomaly Detection Model Based on Personalized PageRank and Contrastive Learning [J]. Computer Science, 2025, 52(2): 80-90.
[11] HE Liren, PENG Bo, CHI Mingmin. Unsupervised Multi-class Anomaly Detection Based on Prototype Reverse Distillation [J]. Computer Science, 2025, 52(2): 202-211.
[12] LUO Qifeng, XIAO Xing, WEN Chaofei, CHI Mingmin, PENG Bo. SAM-MR:SAM-based Mixed Region Matching Expert Adaptation Algorithm for FabricDetection [J]. Computer Science, 2025, 52(11A): 241200124-6.
[13] GAO Lingting, YE Jianhong, JIANG Wenhui, HUANG Yifan. Study of Temporal Uncertainty in Infix/Postfix Trace Alignment Conformance [J]. Computer Science, 2025, 52(11A): 241200200-8.
[14] GUO Fangyuan, JI Genlin. Video Anomaly Detection Method Based on Dual Discriminators and Pseudo Video Generation [J]. Computer Science, 2024, 51(8): 217-223.
[15] KONG Lingchao, LIU Guozhu. Review of Outlier Detection Algorithms [J]. Computer Science, 2024, 51(8): 20-33.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!