Skip to main content
Log in

A Systematic Review of Anomaly Detection for Business Process Event Logs

  • State of the Art
  • Published:
Business & Information Systems Engineering Aims and scope Submit manuscript

Abstract

While a business process is most often executed following a normal path, anomalies may sometimes arise and can be captured in event logs. Event log anomalies stem, for instance, from system malfunctioning or unexpected behavior of human resources involved in a process. To identify and possibly fix these, anomaly detection has emerged recently as a key discipline in process mining. In the paper, the authors present a systematic review of the literature on business process event log anomaly detection. The review aims at selecting systematically studies in the literature that have tackled the issue of event log anomaly detection, classifying existing approaches based on criteria emerging from previous literature reviews, and identifying those research directions in this field that have not been explored extensively. Based on the results of the review, the authors argue that future research should look more specifically into anomaly detection on event streams, extending the number of event log attributes considered to determine anomalies, and producing more standard labeled datasets to benchmark the techniques proposed.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

Notes

  1. The BPIC event logs are available at

    (i) BPIC2012: https://doi.org/10.4121/uuid:3926db30-f712-4394-aebc-75976070e91f,

    (ii) BPIC2013: https://doi.org/10.4121/uuid:a7ce5c55-03a7-4583-b855-98b86e1a2b07,

    (iii) BPIC2015: https://doi.org/10.4121/uuid:31a308ef-c844-48da-948c-305d167a0ec1,

    (iv) BPIC2017: https://doi.org/10.4121/uuid:3926db30-f712-4394-aebc-75976070e91f,

    and (v) BPIC2018: https://doi.org/10.4121/uuid:3301445f-95e8-4ff0-98a4-901f1f204972.

  2. Available at https://doi.org/10.4121/uuid:0c60edf1-6f83-4e75-9367-4c63b3e9d5bb.

  3. Available at https://doi.org/10.4121/uuid:76c46b83-c930-4798-a1c9-4be94dfeb741.

  4. Available at https://www.cs.unm.edu/~immsec/data/live-lpr.html.

  5. Available at https://www.bugzilla.org/.

References

  • Aggarwal CC (2017) An introduction to outlier analysis. In: Aggarwal CC (ed) Outlier analysis. Springer, Heidelberg, pp 1–34

    Chapter  Google Scholar 

  • Andrews R, Wynn MT, Vallmuur K, Ter Hofstede AH, Bosley E, Elcock M, Rashford S (2019) Leveraging data quality to better prepare for process mining: an approach illustrated through analysing road trauma pre-hospital retrieval and transport processes in queensland. Int J Environ Res Pub Health 16(7):1138

    Article  Google Scholar 

  • Bao L, Li Q, Lu P, Lu J, Ruan T, Zhang K (2018) Execution anomaly detection in large-scale systems through console log analysis. J Syst Softw 143:172–186

    Article  Google Scholar 

  • Bezerra F, Wainer J (2011) Fraud detection in process aware systems. Int J Bus Process Integ Manag 5(2):121–129

    Article  Google Scholar 

  • Bezerra F, Wainer J (2013) Algorithms for anomaly detection of traces in logs of process aware information systems. Inf Syst 38(1):33–44

    Article  Google Scholar 

  • Bezerra F, Wainer J, van der Aalst WMP (2009) Anomaly detection using process mining. Enterprise, business-process and information systems modeling. Springer, Heidelberg, pp 149–161

    Chapter  Google Scholar 

  • Böhmer K, Rinderle-Ma S (2016) Multi-perspective anomaly detection in business process execution events. Otm confederated international conferences on the move to meaningful internet systems. Springer, Heidelberg, pp 80–98

  • Böhmer K, Rinderle-Ma S (2017) Anomaly detection in business process runtime behavior–challenges and limitations. arXiv preprint arXiv:1705.06659

  • Böhmer K, Rinderle-Ma S (2020) Mining association rules for anomaly detection in dynamic process runtime behavior and explaining the root cause to users. Inf Syst 90(101):438

    Google Scholar 

  • Boldt M, Borg A, Ickin S, Gustafsson J (2020) Anomaly detection of event sequences using multiple temporal resolutions and markov chains. Knowl Inf Syst 62(2):669–686

    Article  Google Scholar 

  • Burattin A, Carmona J (2017) A framework for online conformance checking. International conference on business process management. Springer, Heidelberg, pp 165–177

    Google Scholar 

  • Carmona J, van Dongen B, Solti A, Weidlich M (2018) Conformance checking. Springer, Heidelberg

    Book  Google Scholar 

  • Chandola V, Banerjee A, Kumar V (2010) Anomaly detection for discrete sequences: a survey. IEEE Transact Knowld Data Eng 24(5):823–839

    Article  Google Scholar 

  • Choi S, Youm S, Kang YS (2019) Development of scalable on-line anomaly detection system for autonomous and adaptive manufacturing processes. Appl Sci 9(21):4502

    Article  Google Scholar 

  • Cuzzocrea A, Folino F, Guarascio M, Pontieri L (2018) Deviance-aware discovery of high-quality process models. Int J Artific Intell Tool 27(07):1860009

    Article  Google Scholar 

  • da Silva CE, da Silva JDS, Paterson C, Calinescu R (2017) Self-adaptive role-based access control for business processes. In: 2017 IEEE/ACM 12th international symposium on software engineering for adaptive and self-managing systems (SEAMS). IEEE, pp 193–203

  • Di Francescomarino C, Ghidini C, Maggi FM, Milani F (2018) Predictive process monitoring methods: Which one suits me best? International conference on business process management. Springer, Heidelberg, pp 462–479

    Chapter  Google Scholar 

  • van Dongen BF, Carmona J, Chatain T (2016) A unified approach for measuring precision and generalization based on anti-alignments. International conference on business process management. Springer, Heidelberg, pp 39–56

    Chapter  Google Scholar 

  • Dumas M, La Rosa M, Mendling J, Reijers HA et al (2013) Fundamentals of business process management, vol 1. Springer, Heidelberg

    Book  Google Scholar 

  • Flach P (2012) Machine learning: the art and science of algorithms that make sense of data. Cambridge University Press, Cambridge

    Book  Google Scholar 

  • Folino F, Greco G, Guzzo A, Pontieri L (2011) Mining usage scenarios in business processes: Outlier-aware discovery and run-time prediction. Data Knowl Eng 70(12):1005–1029

    Article  Google Scholar 

  • Galanti R, Coma-Puig B, de Leoni M, Carmona J, Navarin N (2020) Explainable predictive process monitoring. In: 2020 2nd international conference on process mining (ICPM). IEEE, pp 1–8

  • Ghosh AK, Schwartzbard A (2000) Analyzing the performance of program behavior profiling for intrusion detection. Research advances in database and information systems security. Springer, Heidelberg, pp 19–32

    Chapter  Google Scholar 

  • Gupta N, Anand K, Sureka A (2015) Pariket: mining business process logs for root cause analysis of anomalous incidents. International workshop on databases in networked information systems. Springer, Heidelberg, pp 244–263

    Google Scholar 

  • Han J, Pei J, Mortazavi-Asl B, Pinto H, Chen Q, Dayal U, Hsu M (2001) Prefixspan: mining sequential patterns efficiently by prefix-projected pattern growth. In: Proceedings of the 17th international conference on data engineering. Citeseer, pp 215–224

  • Harl M, Weinzierl S, Stierle M, Matzner M (2020) Explainable predictive business process monitoring using gated graph neural networks. J Decis Syst 29(sup1):312–327

    Article  Google Scholar 

  • Hodge V, Austin J (2004) A survey of outlier detection methodologies. Artific Intell Rev 22(2):85–126

    Article  Google Scholar 

  • Huang Z, Dong W, Ji L, Yin L, Duan H (2015) On local anomaly detection and analysis for clinical pathways. Artific Intell Med 65(3):167–177

    Article  Google Scholar 

  • Huda S, Sarno R, Ahmad T (2016) Increasing accuracy of process-based fraud detection using a behavior model. Int J Softw Eng Appl 10(5):175–188

    Google Scholar 

  • Huynh VH, Le AN (2012) Process mining and security: visualization in database intrusion detection. Pacific-Asia workshop on intelligence and security informatics. Springer, Heidelberg, pp 81–95

    Chapter  Google Scholar 

  • Junior SB, Ceravolo P, Damiani E, Omori NJ, Tavares GM (2020) Anomaly detection on event logs with a scarcity of labels. In: 2020 2nd international conference on process mining (ICPM). IEEE, pp 161–168

  • Kitchenham B, Charters S (2007) Guidelines for performing systematic literature reviews in software engineering. Tech. rep., EBSE Technical Report EBSE-2007-01

  • Ko J, Comuzzi M (2021) Detecting anomalies in business process event logs using statistical leverage. Inf Syst 549:53–67

    Google Scholar 

  • Ko J, Comuzzi M (2022) Keeping our rivers clean: Information-theoretic online anomaly detection for streaming business process events. Inf Syst 104(101):894

    Google Scholar 

  • Kolosova AA, Lomazova IA (2019) Detection of anomalies in the criminal proceedings based on the analysis of event logs. International conference on analysis of images, social networks and texts. Springer, Heidelberg, pp 401–410

    Google Scholar 

  • Koschmider A, Kaczmarek K, Krause M, Zelst SJv, (2021) Demystifying noise and outliers in event logs: review and future directions. In: International conference on business process management. Springer, Heidelberg, pp 123–135

  • Li Guangming, van der Aalst Wil M.P. (2017) A framework for detecting deviations in complex event logs. Intell Data Anal 21(4):759–779. https://doi.org/10.3233/IDA-160044

    Article  Google Scholar 

  • Li X, Xue Y, Malin B (2012) Detecting anomalous user behaviors in workflow-driven web applications. In: 2012 IEEE 31st symposium on reliable distributed systems. IEEE, pp 1–10

  • Lillegraven TN, Wolden AC (2010) Design of a bayesian recommender system for tourists presenting a solution to the cold-start user problem. Master’s thesis, Institutt for datateknikk og informasjonsvitenskap

  • Linn C, Werth D (2016) Sequential anomaly detection techniques in business processes. International conference on business information systems. Springer, Heidelberg, pp 196–208

    Google Scholar 

  • Myers D, Suriadi S, Radke K, Foo E (2018) Anomaly detection for industrial control systems using process mining. Comput Secur 78:103–125

    Article  Google Scholar 

  • Nguyen HTC, Lee S, Kim J, Ko J, Comuzzi M (2019) Autoencoders for improving quality of process event logs. Expert Syst Appl 131:132–147

    Article  Google Scholar 

  • Nolle T, Luettgen S, Seeliger A, Mühlhäuser M (2018) Analyzing business process anomalies using autoencoders. Mach Learn 107(11):1875–1893

    Article  Google Scholar 

  • Nolle T, Luettgen S, Seeliger A, Mühlhäuser M (2019) Binet: multi-perspective business process anomaly classification. Inf Syst 101458

  • Nolle T, Seeliger A, Thoma N, Mühlhäuser M (2020) Deepalign: alignment-based process anomaly correction using recurrent neural networks. International conference on advanced information systems engineering. Springer, Heidelberg, pp 319–333

    Chapter  Google Scholar 

  • Omair B, Alturki A (2020) A systematic literature review of fraud detection metrics in business processes. IEEE Access 8:26893–26903

    Article  Google Scholar 

  • Pauwels S, Calders T (2019) An anomaly detection technique for business processes based on extended dynamic Bayesian networks. In: Proceedings of the 34th ACM/SIGAPP symposium on applied computing, pp 494–501

  • Pimentel MA, Clifton DA, Clifton L, Tarassenko L (2014) A review of novelty detection. Signal Process 99:215–249

    Article  Google Scholar 

  • Rama-Maneiro E, Vidal J, Lama M (2021) Deep learning for predictive business process monitoring: review and benchmark. IEEE Transact Service Comput

  • Ribeiro CE, Zárate LE (2016) Data preparation for longitudinal data mining: a case study on human ageing. J Inf Data Manag 7(2):116–116

    Google Scholar 

  • Riera TS, Higuera JRB, Higuera JB, Herraiz JJM, Montalvo JAS (2020) Prevention and fighting against web attacks through anomaly detection technology. A systematic review. Sustain 12(12):1–45

    Google Scholar 

  • Riveiro M, Pallotta G, Vespe M (2018) Maritime anomaly detection: a review. Wiley Interdisc Rev Data Min Knowl Discov 8(5):e1266

    Article  Google Scholar 

  • Rullo A, Guzzo A, Serra E, Tirrito E (2020) A framework for the multi-modal analysis of novel behavior in business processes. International conference on intelligent data engineering and automated learning. Springer, Heidelberg, pp 51–63

    Google Scholar 

  • Saini V, Singh P, Sureka A (2020) Control-flow based anomaly detection in the bug-fixing process of open-source projects. In: Proceedings of the 13th innovations in software engineering conference on formerly known as India software engineering conference, pp 1–11

  • Sani MF, van Zelst SJ, van der Aalst WMP (2018) Repairing outlier behaviour in event logs. International conference on business information systems. Springer, Heidelberg, pp 115–131

    Chapter  Google Scholar 

  • Sani MF, van Zelst SJ, van der Aalst WMP (2019) Repairing outlier behaviour in event logs using contextual behaviour. Enterp Modell Inf Syst Architec (EMISAJ) 14:5–1

    Google Scholar 

  • Saraeian S, Shirazi B (2020) Process mining-based anomaly detection of additive manufacturing process activities using a game theory modeling approach. Comput Indust Eng 146(106):584

    Google Scholar 

  • Sarno R, Sinaga F, Sungkono KR (2020) Anomaly detection in business processes using process mining and fuzzy association rule learning. J Big Data 7(1):1–19

    Article  Google Scholar 

  • Schumann G, Kruse F, Nonnenmacher J (2020) A practice-oriented, control-flow-based anomaly detection approach for internal process audits. International conference on service-oriented computing. Springer, Heidelberg, pp 533–543

    Chapter  Google Scholar 

  • Setiawan W, Thounaojam Y, Narayan A (2020) Gwad: Greedy workflow graph anomaly detection framework for system traces. In: 2020 IEEE international conference on systems, man, and cybernetics (SMC). IEEE, pp 2790–2796

  • Singh K, Upadhyaya S (2012) Outlier detection: applications and techniques. Int J Comput Sci Issue (IJCSI) 9(1):307

    Google Scholar 

  • Sureda Riera T, Bermejo Higuera JR, Bermejo Higuera J, Martínez Herraiz JJ, Sicilia Montalvo JA (2020) Prevention and fighting against web attacks through anomaly detection technology. A systematic review. Sustain 12(12):4945

    Article  Google Scholar 

  • Tavares GM, Barbon S (2020) Analysis of language inspired trace representation for anomaly detection. ADBIS, TPDL and EDA 2020 common workshops and doctoral consortium. Springer, Heidelberg, pp 296–308

    Chapter  Google Scholar 

  • Tavares GM, da Costa VGT, Martins VE, Ceravolo P, Barbon S Jr (2019) Leveraging anomaly detection in business process with data stream mining. iSys-Revista Brasileira de Sistemas de Informação 12(1):54–75

    Google Scholar 

  • van der Aalst WMP (2011) Process discovery: an introduction. In: van der Aalst WMP (ed) Process mining. Springer, Heidelberg, pp 125–156

    Chapter  Google Scholar 

  • van der Aalst WMP (2016) Process mining: data science in action, vol 2. Springer, Heidelberg

    Book  Google Scholar 

  • van der Aalst WMP, de Medeiros AKA (2005) Process mining and security: detecting anomalous process executions and checking process conformance. Electron Notes Theor Comput Sci 121:3–21

    Article  Google Scholar 

  • van der Aalst WMP, Bichler M, Heinzl A (2018) Robotic process automation. Springer, Heidelberg

    Google Scholar 

  • Vijayakamal M, Vasumathi D (2020) Unsupervised learning methods for anomaly detection and log quality improvement using process event log. Int J Adv Sci Technol 1109–1125

  • Witten IH, Frank E, Hall MA, Pal CJ, DATA M (2005) Practical machine learning tools and techniques. In: Data min, vol 2

  • van Zelst SJ, van Dongen BF, van der Aalst WMP (2018) Event stream-based process discovery using abstract representations. Knowl Inf Syst 54(2):407–435

    Article  Google Scholar 

  • van Zelst SJ, Sani MF, Ostovar A, Conforti R, La Rosa M (2020) Detection and removal of infrequent behavior from event streams of business processes. Inf Syst 90(101):451

    Google Scholar 

  • vom Brocke J, Jans M, Mendling J, Reijers HA (2021) A five-level framework for research on process mining. Bus Inf Syst Eng 63(5):483–490

    Article  Google Scholar 

  • Zerbino P, Stefanini A, Aloini D (2021) Process science in action: a literature review on process mining in business management. Technol Forecast Soc Change 172(121):021

    Google Scholar 

  • Zhu T, Guo Y, Ju A, Ma J, Wang X (2017) An insider threat detection method based on business process mining. Int J Bus Data Commun Netw (IJBDCN) 13(2):83–98

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Marco Comuzzi.

Additional information

Accepted after 2 revision by Hajo Reijers.

Supplementary Information

Below is the link to the electronic supplementary material.

Supplementary file 1 (pdf 94 KB)

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ko, J., Comuzzi, M. A Systematic Review of Anomaly Detection for Business Process Event Logs. Bus Inf Syst Eng 65, 441–462 (2023). https://doi.org/10.1007/s12599-023-00794-y

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12599-023-00794-y

Keywords

Navigation