Professional Documents
Culture Documents
Acknowledgment: This research was supported by the Basic Science Research Program,
(Grant No. 2017R1A2B2010697), through the National Research Foundation of Korea (NRF) funded by the
Ministry of Education, Republic of Korea.
2
IEEE eXtensible Event Stream (XES) standard
The UML 2.0 class diagram for the complete meta-model for the XES standard (Source: http://xes-standard.org) 3
Process Mining Framework
• Objective: Discover the Information Control Net model from the log
6
Case study 1: Process mining in large bank transaction system
Traces 10.000
Log summary
Events 678.864
Activities 113 7
DEMO CASE STUDY 1
Information control net (ICN) Model
9
Deliberate noises
A STAR
T
B C
B C
D E
D E
Potential
Deliberate Noises F Discovered
F
Deliberate Noises
G END
10
The ρ-Algorithm framework
A Specific Temporal
Business Process Workcase Models
Model TWCM1
Pairs of Temporally Ordered
BP Instance a1 Adjacent-Activities Group1
Event Traces AAG1 A Mined
WT1 a2 a1
Proportional Process Pattern Graph
a2 with the Proportional Counters a1
we11 a2 Quantitative Adjacent-Activity Set
a4
we12 a4 with the Proportional Counters M-P3G 0.35 0.65
we03 a1 a1 a1 a1 a1
Proportional a3 a2
Counter-a1 70 130
70 130
a1
a1
AAG2 a3 a2 a3
a3 a2 0.25 0.75
we11 a3 a2
a2 a2 98
a2 a2 a2 a2 Proportional 70 32
we12 a2 a6 a4 a5
LOGs a4
Counter-a2 32 98
a6 a4 a5
we03 a5 a4 a5 a4 a4 a5
Business Process
Enactment
Event Histories and Logs a3 a3 a3 Proportional a3 Proportional Process Patterns
in the XES Format Counter-a3 70 ² Linear (Sequential) Pattern
a1 AAGn a6 a6 a6 a6 ² Disjunctive (Selective) Pattern
we03 a1
a3 ² Conjunctive (Parallel) Pattern
we14 a3
a3 ² Iterative (Loop) Pattern D-PICN
we05
a6 A Discovered
a6
WTn Proportional Information Control Net
TWCMn
11
The Algorithmic principle for making OPEN-gateways
327
2
327
2 =
1693 1579 4>
327
622
PBAP
2
RAP SAV RAP SAV SAV
RAP
3272
3272
==
= 327
3272
2
AND_CLOSE
18458
FRPP
18458
LOOP_OPEN
10000(p:0.542) 8458(p:0.458)
EPP REPP
START
10000
10000
OR_OPEN
ST
4813(p:0.481) 5187(p:0.519)
10000
SHRRP SLRRP
STRR
10000
HRHA HRRAN SHRRPC AND_CLOSE
FTRR
OR_OPEN
CSPID
OR_CLOSE
OR_OPEN 5005
4813(p:1.000) 9657
2482(p:0.497) 2513(p:0.503) ROC
FHRRPC
RBID SCUC
9657
2482 2513
LOOP_OPEN
GBID AND_OPEN
4813
AND_CLOSE
FHRRP
2482 FCUC
4813(p:0.481)
ABID 2513(p:0.503)
OR_CLOSE
2482(p:0.497)
10000
OR_CLOSE
4995
FRP
RNC
10000
4995(p:0.499)
STT
OR_CLOSE
10000
10000
FSA
OR_OPEN
10000
5065(p:0.506) 4935(p:0.493)
SPV
SIT SET
10000
5065(p:0.538) 4935(p:0.534)
OR_OPEN
OR_OPEN CC OR_OPEN
LOOP_OPEN LOOP_OPEN
ACA MCA AC SAV LOOP_CLOSE
CET
CIBCHSN CBCHSN CACHSN CPC FAV ARAP URAP
RET RGET
3402 3326(p:1.000) 3326(p:1.000) 3272
10000
RCH ECHRR CCHRA 3326 AND_CLOSE
FTT
10000
AND_CLOSE RCAP
SC
ICN Model discovered from the large bank transaction log
10000
FCHPP FAPP
AND_OPEN
Case study 1: Process mining in large bank transaction system
3402(p:0.340) 3272(p:0.327)
10000
RTC SRCP
FPP
SRP
OR_OPEN OR_OPEN
10000(p:0.542)
4974(p:0.497) 4954(p:0.495) 5046(p:0.505)
LOOP_CLOSE
RATC 10000(p:1.000) ER PR
18458
18458
10000(p:1.000)OR_CLOSE ESR GPR
AND_OPEN
AND_CLOSE
FRCP
18458
10000(p:1.000)
FRPP
AND_CLOSE
18458
10000
LOOP_OPEN
FC 10000(p:0.542) 8458(p:0.458)
EPP REPP
10000
14
10000
FT
OR_OPEN
4813(p:0.481) 5187(p:0.519)
10000
SHRRP SLRRP
END
4813 5187
OR_OPEN AND_OPEN
AND_CLOSE OR_OPEN
CASE STUDY 2
Case study 2: Process mining in paper peer review system
Invite reviewers
Collect Accept/
Decide
reviews Reject
Invite additional
reviewers
18
Work Transference Network - Example
20
Deliberate noises in WTN
DEMO CASE STUDY 2
The Rediscovered
Work Transference Network Model
Before Discovering and Excluding Deliberate Noises
The Rediscovered
Information Control Net Process Model
LOOP_CLOSE START
START
The Rediscovered
Work Transference Network Model
OR_OPEN LOOP_OPEN
time_out 1 time_out 2 time_out 3 get review 3 get review 1 get review 2 invite reviewers
Mike
After Discovering and Excluding Deliberate Noises
OR_CLOSE Mary
LOOP_OPEN
Anne
collect reviews
LOOP_CLOSE Pam Sam John Carol Pete END Wil __INVALID__ Sara
LOOP_OPEN
decide
LOOP_CLOSE
OR_OPEN
LOOP_CLOSE
LOOP_OPEN
LOOP_CLOSE
LOOP_OPEN
OR_OPEN OR_OPEN
OR_CLOSE OR_CLOSE
LOOP_OPEN LOOP_OPEN
The Complete
accept reject
Work Transference Network Model
LOOP_CLOSE
LOOP_CLOSE
OR_CLOSE
END
CASE STUDY 3
Case study 3: Process mining in detecting malware behavior
25
Case study 3: Process mining in detecting malware behavior
26
Case study 3: Process mining in detecting malware behavior
• Transfer (reformat) system log into eXtensible Event Stream (XES) format.
• From XES Log reformatted, build the graph of process then analysis process behavior
28
Case study 3: Process mining in detecting malware behavior
31
DEMO CASE STUDY 3
Case study 3: Process mining in detecting malware behavior
34
Case study 3: Process mining in detecting malware behavior
35
VirusTotal shows the Virus information
Conclusion
Conclusion
37
PhD student: Dinh-Lam Pham