A Latitudinal Study on the Use of Sequential and Concurrency Patterns in Deviance Mining

  • Laura GengaEmail author
  • Domenico Potena
  • Andrea Chiorrini
  • Claudia Diamantini
  • Nicola Zannone
Part of the Studies in Computational Intelligence book series (SCI, volume 880)


Deviance mining is an emerging area in the field of Process Mining, with the aim of explaining the differences between normal and deviant process executions. Deviance mining approaches typically extract representative subprocesses characterizing normal/deviant behaviors from an event log and use these subprocesses as features for classification. Existing approaches mainly differ for the employed feature extraction technique and, in particular, for the representation of the patterns extracted, ranging from patterns consisting of sequence of activities to patterns explicitly representing concurrency. In this work, we perform a latitudinal study on the use of sequential and concurrency patterns in deviance mining. Comparisons between sequential and concurrency patterns is performed through experiments on two real-world event logs, by varying both classification and feature extraction algorithms. Our results show that the pattern representation has limited impact on classification performance, while the use of concurrency patterns provides more meaningful insights on deviant behavior.



This work is partially supported by ITEA3 through the APPSTACLE project (15017) and by the RSA-B project SeCludE.


  1. 1.
    van der Aalst, W.: Process Mining: Discovery Conformance and Enhancement of Business Processes. Springer, Berlin (2011)CrossRefGoogle Scholar
  2. 2.
    van Beest, N.R., Dumas, M., García-Bañuelos, L., La Rosa, M.: Log delta analysis: interpretable differencing of business process event logs. Business Process Management. LNCS, vol. 9253, pp. 386–405. Springer, Berlin (2015)Google Scholar
  3. 3.
    Bose, R., van der Aalst, W.: Abstractions in process mining: a taxonomy of patterns. Business Process Management. LNCS, vol. 5701, pp. 159–175. Springer, Berlin (2009)Google Scholar
  4. 4.
    Bose, R., van der Aalst, W.: Trace clustering based on conserved patterns: towards achieving better process models. Business Process Management, pp. 170–181. Springer, Berlin (2009)Google Scholar
  5. 5.
    Bose, R., van der Aalst, W.: Discovering signature patterns from event logs. In: Proceedings of Computational Intelligence and Data Mining, pp. 111–118. IEEE (2013)Google Scholar
  6. 6.
    vanden Broucke, S.K., Munoz-Gama, J., Carmona, J., Baesens, B., Vanthienen, J.: Event-based real-time decomposed conformance analysis. In: OTM Confederated International Conferences, pp. 345–363. Springer (2014)Google Scholar
  7. 7.
    Chandrashekar, G., Sahin, F.: A survey on feature selection methods. Comput. Electr. Eng. 40(1), 16–28 (2014)CrossRefGoogle Scholar
  8. 8.
    Chen, N., Hoi, S.C., Xiao, X.: Software process evaluation: a machine learning approach. In: Proceedings of International Conference on Automated Software Engineering, pp. 333–342. IEEE (2011)Google Scholar
  9. 9.
    Cuzzocrea, A., Folino, F., Guarascio, M., Pontieri, L.: A multi-view learning approach to the discovery of deviant process instances. In: OTM Confederated International Conferences, pp. 146–165. Springer (2015)Google Scholar
  10. 10.
    Diamantini, C., Genga, L., Potena, D., van der Aalst, W.: Building instance graphs for highly variable processes. Expert Syst. Appl. 59, 101–118 (2016)CrossRefGoogle Scholar
  11. 11.
    Domingos, P.: MetaCost: a general method for making classifiers cost-sensitive. In: Proceedings of International Conference on Knowledge Discovery and Data Mining, pp. 155–164. ACM (1999)Google Scholar
  12. 12.
    Genga, L., Zannone, N.: Towards a systematic process-aware behavioral analysis for security. In: Proceedings of International Joint Conference on e-Business and Telecommunications, vol. 1, pp. 26–28. SciTePress (2018)Google Scholar
  13. 13.
    Genga, L., Diamantini, C., Potena, D., Zannone, N.: Deviance mining with concurrency. In: Proceedings of International Workshop on New Frontiers in Mining Complex Patterns (2018)Google Scholar
  14. 14.
    Greco, G., Guzzo, A., Manco, G., Saccà, D.: Mining unconnected patterns in workflows. Inf. Syst. 32(5), 685–712 (2007)CrossRefGoogle Scholar
  15. 15.
    Hall, M.A.: Correlation-based feature selection for machine learning. Ph.D. thesis (1999)Google Scholar
  16. 16.
    Han, J., Pei, J., Kamber, M.: Data Mining: Concepts and Techniques. Morgan Kaufmann, Waltham (2012)CrossRefGoogle Scholar
  17. 17.
    Hwang, S.Y., Wei, C.P., Yang, W.S.: Discovery of temporal patterns from process instances. Comput. Ind. 53(3), 345–364 (2004)CrossRefGoogle Scholar
  18. 18.
    Jiang, C., Coenen, F., Zito, M.: A survey of frequent subgraph mining algorithms. Knowl. Eng. Rev. 28(1), 75–105 (2013)CrossRefGoogle Scholar
  19. 19.
    Jonyer, I., Cook, D., Holder, L.: Graph-based hierarchical conceptual clustering. J. Mach. Learn. Res. 2, 19–43 (2002)zbMATHGoogle Scholar
  20. 20.
    Kuramochi, M., Karypis, G.: An efficient algorithm for discovering frequent subgraphs. IEEE Trans. Knowl. Data Eng. 16(9), 1038–1051 (2004)CrossRefGoogle Scholar
  21. 21.
    Leemans, M., van der Aalst, W.: Discovery of frequent episodes in event logs. In: Proceedings of International Symposium on Data-Driven Process Discovery and Analysis, pp. 1–31. (2014)Google Scholar
  22. 22.
    Lo, D., Cheng, H., Han, J., Khoo, S.C., Sun, C.: Classification of software behaviors for failure detection: a discriminative pattern mining approach. In: Proceedings of International Conference on Knowledge Discovery and Data Mining, pp. 557–566. ACM (2009)Google Scholar
  23. 23.
    Mannhardt, F., Blinde, D.: Analyzing the trajectories of patients with sepsis using process mining. In: Proceedings of RADAR+EMISA, vol. 1859, pp. 72–80. (2017)Google Scholar
  24. 24.
    Molina, L.C., Belanche, L., Nebot, À.: Feature selection algorithms: a survey and experimental evaluation. In: Proceedings of International Conference on Data Mining, pp. 306–313. IEEE (2002)Google Scholar
  25. 25.
    Nguyen, H., Dumas, M., La Rosa, M., Maggi, F.M., Suriadi, S.: Mining business process deviance: a quest for accuracy. In: OTM Confederated International Conferences, pp. 436–445. Springer (2014)Google Scholar
  26. 26.
    Sun, C., Du, J., Chen, N., Khoo, S.C., Yang, Y.: Mining explicit rules for software process evaluation. In: Proceedings of International Conference on Software and System Process, pp. 118–125. ACM (2013)Google Scholar
  27. 27.
    Suriadi, S., Wynn, M.T., Ouyang, C., ter Hofstede, A.H., van Dijk, N.J.: Understanding process behaviours in a large insurance company in Australia: a case study. Advanced Information Systems Engineering. LNCS, vol. 7908, pp. 449–464. Springer, Berlin (2013)Google Scholar
  28. 28.
    Tax, N., Genga, L., Zannone, N.: On the use of hierarchical subtrace mining for efficient local process model mining. In: Proceedings of International Symposium on Data-Driven Process Discovery and Analysis, CEUR Workshop Proceedings, vol. 2016, pp. 8–22. (2017)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Laura Genga
    • 1
    Email author
  • Domenico Potena
    • 2
  • Andrea Chiorrini
    • 2
  • Claudia Diamantini
    • 2
  • Nicola Zannone
    • 1
  1. 1.Eindhoven University of TechnologyEindhovenThe Netherlands
  2. 2.Università Politecnica delle MarcheAnconaItaly

Personalised recommendations