Active Anomaly Detection for Key Item Selection in Process Auditing
نویسندگان
چکیده
Abstract Process mining allows auditors to retrieve crucial information about transactions by analysing the process data of a client. We propose an approach that supports identification unusual or unexpected transactions, also referred as exceptions. These exceptions can be selected “key items”, meaning wants look further into underlying documentation transaction. The encodes traces, assigns anomaly score each trace, and uses domain knowledge update assigned scores through active detection. is evaluated with three groups over cycles. results evaluation indicate has potential support decision-making auditors. Although still need make manual selection key items, they are able better substantiate this selection. As such, our research seen step forward respect usage detection analysis in auditing.
منابع مشابه
Model selection for anomaly detection
Anomaly detection based on one-class classification algorithms is broadly used in many applied domains like image processing (e.g. detection of whether a patient is “cancerous” or “healthy” from mammography image), network intrusion detection, etc. Performance of an anomaly detection algorithm crucially depends on a kernel, used to measure similarity in a feature space. The standard approaches ...
متن کاملActive Hypothesis Testing for Quickest Anomaly Detection
The problem of quickest detection of an anomalous process among M processes is considered. At each time, a subset of the processes can be observed, and the observations from each chosen process follow two different distributions, depending on whether the process is normal or abnormal. The objective is a sequential search strategy that minimizes the expected detection time subject to an error pr...
متن کاملAssessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing
Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional network-based intrusion detection systems (IDSs) are ineffective to be deployed in the cloud...
متن کاملHybrid Negative Selection Approach for Anomaly Detection
This paper describes b-v model which is enhanced version of the negative selection algorithm (NSA). In contrast to formerly presented approaches, binary and real-valued detectors are incorporated. The reason behind developing this hybrid is willingness to overcome the scalability problems, which are a key problem, when only one type of detectors is used. Although high-dimensional datasets are a...
متن کاملAnomaly Detection Using Process Mining
Recently, several large companies have been involved in financial scandals related to mismanagement, resulting in financial damages for their stockholders. In response, certifications and manuals for best practices of governance were developed, and in some cases, tougher federal laws were implemented (e.g. the Sarboness Oxley Act). Companies adhered to these changes adopting the best practices ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Lecture notes in business information processing
سال: 2022
ISSN: ['1865-1348', '1865-1356']
DOI: https://doi.org/10.1007/978-3-030-98581-3_13