Root Cause Analysis with Enriched Process Logs

  • Suriadi Suriadi
  • Chun Ouyang
  • Wil M. P. van der Aalst
  • Arthur H. M. ter Hofstede
Part of the Lecture Notes in Business Information Processing book series (LNBIP, volume 132)

Abstract

In the field of process mining, the use of event logs for the purpose of root cause analysis is increasingly studied. In such an analysis, the availability of attributes/features that may explain the root cause of some phenomena is crucial. Currently, the process of obtaining these attributes from raw event logs is performed more or less on a case-by-case basis: there is still a lack of generalized systematic approach that captures this process. This paper proposes a systematic approach to enrich and transform event logs in order to obtain the required attributes for root cause analysis using classical data mining techniques, the classification techniques. This approach is formalized and its applicability has been validated using both self-generated and publicly-available logs.

Keywords

process mining root cause analysis event logs 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Andersen, B., Fagerhaug, T.: Root Cause Analysis: Simplified Tools and Techniques, 2nd edn. ASQ Quality Press (2006) ISBN-12 978-0-87389-692-4Google Scholar
  2. 2.
    R.P. Jagadeesh Chandra Bose. Process Mining in the Large: Preprocessing, Discovery, and Diagnostic. PhD thesis, TUE, Eindhoven, The Netherlands (2012)Google Scholar
  3. 3.
    Cakir, G.S.: Development of a condition based maintenance decision model by data mining. Master’s thesis, TUE, Eindhoven, The Netherlands (2011)Google Scholar
  4. 4.
    Caldwell, F.: CEO survey 2012: CIOs must link risk management and compliance to business priorities. Gartner (G00226165) (March 2012)Google Scholar
  5. 5.
    Chen, S.: Pilot fatigue is like ‘having too much to drink’. CNN News (May 2009)Google Scholar
  6. 6.
    Cohen, W.W.: Fast effective rule induction. In: Proceedings of 12th International Conference on Machine Learning, pp. 115–123. Morgan Kaufmann (1995)Google Scholar
  7. 7.
    Cao, L., et al. (eds.): Data Mining for Business Applications. Springer (2009)Google Scholar
  8. 8.
    Heravizadeh, M., et al.: Root cause analysis in business processes. Technical report, Queensland University of Technology (2008)Google Scholar
  9. 9.
    Horev, M.: Root Cause Analysis in Process-Based Industries. Trafford Publishing (2008)Google Scholar
  10. 10.
    Jensen, K., Kristensen, L.M.: Coloured Petri Nets - Modelling and Validation of Concurrent Systems. Springer (2009)Google Scholar
  11. 11.
    Liu, F.: Fault diagnosis using process mining. Master’s thesis, TUE, Eindhoven, The Netherlands (2010)Google Scholar
  12. 12.
    Maier, D.: The Theory of Relational Databases. Computer Science Press (1983)Google Scholar
  13. 13.
    De Medeiros, A.K.A., Günther, C.W.: Process mining: Using CPN tools to create test logs for mining algorithms. In: 6th Workshop and Tutorial on Practical Use of Coloured Petri Nets and the CPN Tools, pp. 177–190 (2005)Google Scholar
  14. 14.
    Nakatumba, J., van der Aalst, W.M.P.: Analyzing Resource Behavior Using Process Mining. In: Rinderle-Ma, S., Sadiq, S., Leymann, F. (eds.) BPM 2009. LNBIP, vol. 43, pp. 69–80. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  15. 15.
    Quinlan, J.R.: C4.5: programs for machine learning. Morgan Kaufmann Publishers Inc., San Francisco (1993)Google Scholar
  16. 16.
    Rozinat, A., et al.: Process mining applied to the test process of wafer scanners in ASML. IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews 39(4), 474–479 (2009)CrossRefGoogle Scholar
  17. 17.
    Rozinat, A., van der Aalst, W.M.P.: Decision Mining in ProM. In: Dustdar, S., Fiadeiro, J.L., Sheth, A.P. (eds.) BPM 2006. LNCS, vol. 4102, pp. 420–425. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  18. 18.
    Suriadi, S., Ouyang, C., van der Aalst, W.M.P., ter Hofstede, A.: Root cause analysis with enriched process logs. Technical Report 50748, Queensland University of Technology (2012), http://eprints.qut.edu.au/50748/
  19. 19.
    van der Aalst, W.M.P.: Process Mining - Discovery, Conformance and Enhancement of Business Processes. Springer (2011)Google Scholar
  20. 20.
    van der Aalst, W., Adriansyah, A., de Medeiros, A.K.A., Arcieri, F., Baier, T., Blickle, T., Bose, J.C., van den Brand, P., Brandtjen, R., Buijs, J., Burattin, A., Carmona, J., Castellanos, M., Claes, J., Cook, J., Costantini, N., Curbera, F., Damiani, E., de Leoni, M., Delias, P., van Dongen, B.F., Dumas, M., Dustdar, S., Fahland, D., Ferreira, D.R., Gaaloul, W., van Geffen, F., Goel, S., Günther, C., Guzzo, A., Harmon, P., ter Hofstede, A., Hoogland, J., Ingvaldsen, J.E., Kato, K., Kuhn, R., Kumar, A., La Rosa, M., Maggi, F., Malerba, D., Mans, R.S., Manuel, A., McCreesh, M., Mello, P., Mendling, J., Montali, M., Motahari-Nezhad, H.R., zur Muehlen, M., Munoz-Gama, J., Pontieri, L., Ribeiro, J., Rozinat, A., Seguel Pérez, H., Seguel Pérez, R., Sepúlveda, M., Sinur, J., Soffer, P., Song, M., Sperduti, A., Stilo, G., Stoel, C., Swenson, K., Talamo, M., Tan, W., Turner, C., Vanthienen, J., Varvaressos, G., Verbeek, E., Verdonk, M., Vigo, R., Wang, J., Weber, B., Weidlich, M., Weijters, T., Wen, L., Westergaard, M., Wynn, M.: Process Mining Manifesto. In: Daniel, F., Barkaoui, K., Dustdar, S. (eds.) BPM Workshops 2011, Part I. LNBIP, vol. 99, pp. 169–194. Springer, Heidelberg (2012)CrossRefGoogle Scholar
  21. 21.
    van der Aalst, W.M.P., Dustdar, S.: Process mining put into context. IEEE Internet Computing 16, 82–86 (2012)CrossRefGoogle Scholar
  22. 22.
    Wilson, P.F., et al.: Root Cause Analysis: A Tool for Total Quality Management. ASQ Quality Press (1993)Google Scholar
  23. 23.
    Witten, I.H., et al.: Weka: Practical machine learning tools and techniques with java implementations (1999)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Suriadi Suriadi
    • 1
  • Chun Ouyang
    • 1
  • Wil M. P. van der Aalst
    • 1
    • 2
  • Arthur H. M. ter Hofstede
    • 1
    • 2
  1. 1.Queensland University of TechnologyAustralia
  2. 2.Eindhoven University of TechnologyThe Netherlands

Personalised recommendations