Challenges of Anomaly Detection in the Object-Centric Setting: Dimensions and the Role of Domain Knowledge

Alessandro Berti,Urszula Jessen,Wil M.P. van der Aalst,Dirk Fahland
2024-07-12
Abstract:Object-centric event logs, allowing events related to different objects of different object types, represent naturally the execution of business processes, such as ERP (O2C and P2P) and CRM. However, modeling such complex information requires novel process mining techniques and might result in complex sets of constraints. Object-centric anomaly detection exploits both the lifecycle and the interactions between the different objects. Therefore, anomalous patterns are proposed to the user without requiring the definition of object-centric process models. This paper proposes different methodologies for object-centric anomaly detection and discusses the role of domain knowledge for these methodologies. We discuss the advantages and limitations of Large Language Models (LLMs) in the provision of such domain knowledge. Following our experience in a real-life P2P process, we also discuss the role of algorithms (dimensionality reduction+anomaly detection), suggest some pre-processing steps, and discuss the role of feature propagation.
Databases
What problem does this paper attempt to address?
This paper mainly explores the challenges of anomaly detection in Object-Centric Process Mining (OCPM). Traditional process mining methods assume that each event is associated with a single case, but in OCPM, events may involve multiple types of objects, leading to increased data complexity. The paper proposes different object-centric anomaly detection methods and emphasizes the role of domain knowledge in these methods. The authors discuss the advantages and disadvantages of Large Language Models (LLMs) in providing domain knowledge, and based on actual Purchase-to-Pay (P2P) process event logs, they conduct a case study to analyze the roles of algorithms (such as dimensionality reduction and anomaly detection), preprocessing steps, and feature propagation. They propose three methods to identify anomalous features: 1. Using domain knowledge evaluators to determine anomalous numerical features. 2. Applying anomaly detection algorithms to score objects and allowing domain knowledge owners to examine the lifecycles of low-scoring objects to analyze detailed anomaly patterns. 3. Aggregating object anomaly scores to generate feature-level anomaly scores. The paper also reviews related works on feature extraction, anomaly detection, and object-centric compliance checking techniques. Methodologically, the paper introduces the concepts of extracting object-centric features from event logs and identifying anomalies through object interactions. In summary, this paper aims to address how to effectively identify and interpret anomalous behaviors involving multiple objects and interactions in complex business processes, thereby providing actionable insights for process improvement.