214
Views
0
CrossRef citations to date
0
Altmetric
Research Article

An Event Log Repair Method Based on Masked Transformer Model

, ORCID Icon, , &
Article: 2346059 | Received 01 Sep 2023, Accepted 15 Apr 2024, Published online: 14 May 2024

References

  • Aalst, W. V. D. 2016. Data science in action. Berlin Heidelberg: Springer.
  • Almodovar, C., F. Sabrina, S. Karimi, and S. Azad. 2024. LogFiT: Log anomaly detection using fine-tuned language models. IEEE Transactions on Network and Service Management 21 (2): 1715–32. doi:10.1109/TNSM.2024.3358730.
  • Aversano, L., M. L. Bernardi, M. Cimitile, M. Iammarino, and C. Verdone. 2023. A data-aware explainable deep learning approach for next activity prediction[J]. Engineering Applications of Artificial Intelligence 126:106758. doi:10.1016/j.engappai.2023.106758.
  • Berti, A., S. van Zelst, and D. Schuster. 2023. PM4Py: A process mining library for Python. Software Impacts 17:100556. doi:10.1016/j.simpa.2023.100556.
  • Bezerra, F., J. Wainer, and W. M. P. van der Aalst. 2009. Anomaly detection using process mining[C]//Enterprise. Business-Process and Information Systems Modeling: 10th International Workshop, BPMDS 2009, and 14th International Conference, EMMSAD 2009, held at CAiSE 2009, Amsterdam, The Netherlands, June 8-9, 2009. Proceedings. Springer Berlin Heidelberg. 149–61.
  • Bukhsh, Z. A., A. Saeed, and R. M. Dijkman. 2021. Processtransformer: Predictive business process monitoring with transformer network[J]. arXiv preprint arXiv:2104.00721.
  • Camargo, M., M. Dumas, and O. González-Rojas. 2019. Learning accurate LSTM models of business processes[C]//Business Process Management. 17th International Conference, BPM 2019, Vienna, Austria, September 1–6, 2019, Proceedings 17. Springer International Publishing. 286–302.
  • Chen, H., X. Fang, and H. Fang. 2022. Multi-task prediction method of business process based on BERT and transfer Learning. Knowledge-Based Systems 254:109603. doi:10.1016/j.knosys.2022.109603.
  • Chen, S., and H. Liao. 2022. Bert-log: Anomaly detection for system logs based on pre-trained language model. Applied Artificial Intelligence 36 (1):2145642. doi:10.1080/08839514.2022.2145642.
  • Chinces, D., and I. Salomie. 2015. Optimizing spaghetti process models. 2015 20th International Conference on Control Systems and Computer Science, Bucharest, Romania, 506–11. doi:10.1109/CSCS.2015.15.
  • c, R. P. J. C., R. S. Mans, and W. M. P. van der Aalst. 2013. Wanna improve process mining results?[C]//2013 IEEE symposium on computational intelligence and data mining (CIDM), 127–34. Piscataway, NJ: IEEE.
  • Devlin, J., M. W. Chang, K. Lee, and K. Toutanova. 2018. Bert: Pre-training of deep bidirectional transformers for language understanding[J]. arXiv preprint arXiv:1810.04805.
  • Di Francescomarino, C., and C. Ghidini. 2022. Predictive process monitoring[J]. Process Mining Handbook. 448:320–46. LNBIP
  • Evermann, J., J. R. Rehse, and P. Fettke. 2016. A Deep Learning Approach for Predicting Process Behaviour at Runtime. In Business Process Management Workshops. BPM 2016. Lecture Notes in Business Information Processing, ed. M. Dumas and M.Fantinato, 327–38. Springer, Cham.
  • Fang, N., X. Fang, and K. Lu. 2022. Online incremental updating for model enhancement based on multi-perspective trusted intervals. Connection Science 34 (1):1956–80. doi:10.1080/09540091.2022.2088696.
  • Fang, H., W. Liu, W. Wang, S. Zhang. 2023. Discovery of process variants based on trace context tree[J]. Connection Science. 35 (1):2190499. doi:10.1080/09540091.2023.2194578.
  • Fani Sani, M., S. J. Zelst, and W. M. P. van der Aalst. 2018. Repairing outlier behaviour in event logs[C]//International Conference on Business Information Systems, 115–31. Cham: Springer.
  • Fischer, D. A., K. Goel, R. Andrews, C.G.J. van Dun, M.T. Wynn, and M. Röglinger. 2020. Enhancing Event Log Quality: Detecting and Quantifying Timestamp Imperfections. In Business Process Management. BPM 2020, ed. D.Fahland, C.Ghidini, J.Becker, and M.Dumas. Lecture Notes in Computer Science, Vol. 12168.
  • Ghionna, L., G. Greco, A. Guzzo, and Pontieri, L. 2008. Outlier Detection Techniques for Process Mining Applications. In Foundations of Intelligent Systems, ed. A. An, S. Matwin, Z.W.Raś, and D.Ślęzak, ISMIS 2008. Lecture Notes in Computer Science(), Vol. 4994. Heidelberg, Berlin: Springer.
  • Guo, H., Y. Guo, J. Yang, J. Liu, Z Li, T. Zheng, L. Zheng, W. Hou, and B. Zhang. 2023. Loglg: Weakly supervised log anomaly detection via log-event graph construction[C]//International Conference on Database Systems for Advanced Applications. Cham: Springer Nature Switzerland. 490–501.
  • Guo, H., X. Lin, J. Yang, J. Bai, T. Zheng, B. Zhang, and Z. Li. 2021. Translog: A unified transformer-based framework for log anomaly detection[J]. arXiv preprint arXiv:2201.00016.
  • Guo, H., J. Yang, J. Liu, et al. 2023. Owl: A large language model for it operations[J]. arXiv preprint arXiv:2309.09298.
  • Guo, H., J. Yang, J. Liu, J. Bai, B. Wang, Z. Li, T. Zheng, B. Zhang, J. Peng, Q. Tian, et al. 2024. LogFormer: A pre-train and tuning pipeline for log anomaly detection[J]. Proceedings of the AAAI Conference on Artificial Intelligence 38 (1):135–43. doi:10.1609/aaai.v38i1.27764. arXiv preprint arXiv:2401.04749
  • Guo, H., S. Yuan, and X. Wu. 2021. Logbert: Log anomaly detection via BERT. 2021 International Joint Conference on Neural Networks (IJCNN), Shenzhen, China, 1–8. doi:10.1109/IJCNN52387.2021.9534113.
  • Guyon, I., and A. Elisseeff. 2003. An introduction to variable and feature selection[J]. Journal of Machine Learning Research 3 (Mar):1157–82.
  • Hao, Y., L. Dong, F. Wei, and Xu, K. 2021. Self-attention attribution: Interpreting information interactions inside transformer[C]//Proceedings of the AAAI Conference on Artificial Intelligence 35 (14): 12963–12971.
  • Lan, Z., M. Chen, S. Goodman, K. Gimpel, P.Sharma, and R. Soricut. 2019. Albert: A lite bert for self-supervised learning of language representations[J]. arXiv preprint arXiv:1909.11942.
  • LeCun, Y., Y. Bengio, and G. Hinton. 2015. Deep learning[J]. Nature 521 (7553):436–44. doi:10.1038/nature14539.
  • Le, V. H., and H. Zhang. 2021. Log-based anomaly detection without log parsing. 2021 36th IEEE/ACM International Conference on Automated Software Engineering (ASE), Melbourne, Australia, 492–504. doi:10.1109/ASE51524.2021.9678773.
  • Liu, Y., M. Ott, N. Goyal, J. Du, M. Joshi, D. Chen, O. Levy, M. Lewis, L. Zettlemoyer, V. Stoyanov, et al. 2019. Roberta: A robustly optimized bert pretraining approach[J]. arXiv preprint arXiv:1907.11692.
  • Liu, J., J. Xu, R. Zhang, S. Reiff-Marganiec. 2021. A repairing missing activities approach with succession relation for event logs[J]. Knowledge and Information Systems. 63 (2):477–95. doi:10.1007/s10115-020-01524-6.
  • Moon, J., G. Park, and J. P.-O. Jeong. 2021. Prediction of process using one-way language model based on nlp approach[J]. Applied Sciences 11 (2):864. doi:10.3390/app11020864.
  • Nguyen, H. T. C., and M. Comuzzi. 2018. Event log reconstruction using autoencoders[C]//international conference on service-oriented computing. Heidelberg, Berlin, Cham:Springer, 335–50.
  • Nguyen, H. T. C., S. Lee, J. Kim, J. Ko, and M. Comuzzi. 2019. Autoencoders for improving quality of process event logs[J]. Expert Systems with Applications 131:132–47. doi:10.1016/j.eswa.2019.04.052.
  • Nolle, T., S. Luettgen, A. Seeliger, and M. Mühlhäuser. 2018. Analyzing business process anomalies using autoencoders[J]. Machine Learning 107 (11):1875–93. doi:10.1007/s10994-018-5702-8.
  • Park, G., and M. Song. 2020. Predicting performances in business processes using deep neural networks. Decision Support Systems 129:113191. doi:10.1016/j.dss.2019.113191.
  • Peters, M. E., M. Neumann, M. Iyyer, M. Gardner, C. Clark, K. Lee, and L. Zettlemoyer. 2018. Deep Contextualized Word Representations. In Proceedings of the 2018 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologie. New Orleans, Louisiana: Association for Computational Linguistics, 2227–2237.
  • Radford, A., K. Narasimhan, T. Salimans, I. and Sutskever. 2018. Improving language understanding by generative pre-training[J].
  • Rogge-Solti, A., R. S. Mans, W. M. P. van der Aalst, and M. Weske. 2013. Improving Documentation by Repairing Event Logs. In The Practice of Enterprise Modeling, ed. J. Grabis, M. Kirikova, J. Zdravkovic, and J. Stirna, Vol. 165. PoEM 2013. Lecture Notes in Business Information Processing. Heidelberg, Berlin: Springer. doi:10.1007/978-3-642-41641-5_10.
  • Sokolova, M., and G. Lapalme. 2009. A systematic analysis of performance measures for classification tasks. Information Processing and Management 45 (4):427–37. doi:10.1016/j.ipm.2009.03.002.
  • Suriadi, S., R. Andrews, AHM ter. Hofstede, and M.T. Wynn. 2017. Event log imperfection patterns for process mining: Towards a systematic approach to cleaning event logs[J]. Information Systems 64: 132–150.
  • Tax, N., I. Verenich, M. La Rosa, and Dumas, M. 2017. Predictive business process monitoring with LSTM neural networks[C]//Advanced Information Systems Engineering: 29th International Conference, CAiSE 2017, Essen, Germany, June 12-16, 2017, Proceedings 29. Springer International Publishing. 477–92.
  • Van Der Aalst, W. 2011. Process mining: Discovery, conformance and enhancement of business processes[M]. Heidelberg: Springer.
  • Van Der Aalst, W., A. Adriansyah, A. K. A. De Medeiros, F. Arcieri, T. Baier, T. Blickle, and M. Wynn. 2012. Process mining manifesto. In Business Process Management Workshops: BPM 2011 International Workshops, Clermont-Ferrand, France, August 29, 2011. 169–94. Springer: Clermont-Ferrand, France.
  • Van der Aalst, W. M. P., and A. K. A. de Medeiros. 2005. Process mining and security: Detecting anomalous process executions and checking process conformance. Electronic Notes in Theoretical Computer Science 121:3–21. doi:10.1016/j.entcs.2004.10.013.
  • van der Aa, H., A. Rebmann, and H. Leopold. 2021. Natural language-based detection of semantic execution anomalies in event logs. Information Systems 102:101824. doi:10.1016/j.is.2021.101824.
  • van Dun, C., L. Moder, W. Kratsch, and M. Röglinger. 2023. ProcessGAN: Supporting the creation of business process improvement ideas through generative machine learning[J]. Decision Support Systems 165:113880. doi:10.1016/j.dss.2022.113880.
  • Vaswani, A., N. Shazeer, N. Parmar, J. Uszkoreit, L. Jones, A. N. Gomez, L. Kaiser, and L. Polosukhin. 2017. Attention is all you need[J]. Advances in Neural Information Processing Systems:30.
  • Wang, J., S. Song, X. Lin, X. Zhu, and J. Pei. 2015. Cleaning structured event logs: A graph repair approach[C]//2015 IEEE 31st International Conference on Data Engineering, 30–41. IEEE.
  • Wang, J., S. Song, X. Zhu, and X. Lin. 2013. Efficient recovery of missing events[J]. Proceedings of the VLDB Endowment. 6 (10):841–852. doi:10.14778/2536206.2536212.
  • Weijters, A. J. M. M., W. M. P. van Der Aalst, and A. K. A. De Medeiros. 2006. Process mining with the HeuristicsMiner algorithm[J].
  • Wynn, M. T., and S. Sadiq. 2019. Responsible process mining-a data quality perspective[C]//business process management: 17th International Conference, BPM 2019, Vienna, Austria, September 1–6, 2019, Proceedings 17. Springer International Publishing. 10–15.
  • Zang, R., H. Guo, J. Yang, J. Liu, Z. Li, T. Zheng, X. Shi, L. Zheng, and B.Zhang. 2024. MLAD: A unified model for multi-system log anomaly detection[J]. arXiv preprint arXiv:2401.07655.