Active Anomaly Detection for Key Item Selection in Process Auditing

نویسندگان

چکیده

Abstract Process mining allows auditors to retrieve crucial information about transactions by analysing the process data of a client. We propose an approach that supports identification unusual or unexpected transactions, also referred as exceptions. These exceptions can be selected “key items”, meaning wants look further into underlying documentation transaction. The encodes traces, assigns anomaly score each trace, and uses domain knowledge update assigned scores through active detection. is evaluated with three groups over cycles. results evaluation indicate has potential support decision-making auditors. Although still need make manual selection key items, they are able better substantiate this selection. As such, our research seen step forward respect usage detection analysis in auditing.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Model selection for anomaly detection

Anomaly detection based on one-class classification algorithms is broadly used in many applied domains like image processing (e.g. detection of whether a patient is “cancerous” or “healthy” from mammography image), network intrusion detection, etc. Performance of an anomaly detection algorithm crucially depends on a kernel, used to measure similarity in a feature space. The standard approaches ...

متن کامل

Active Hypothesis Testing for Quickest Anomaly Detection

The problem of quickest detection of an anomalous process among M processes is considered. At each time, a subset of the processes can be observed, and the observations from each chosen process follow two different distributions, depending on whether the process is normal or abnormal. The objective is a sequential search strategy that minimizes the expected detection time subject to an error pr...

متن کامل

Assessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing

Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional network-based intrusion detection systems (IDSs) are ineffective to be deployed in the cloud...

متن کامل

Hybrid Negative Selection Approach for Anomaly Detection

This paper describes b-v model which is enhanced version of the negative selection algorithm (NSA). In contrast to formerly presented approaches, binary and real-valued detectors are incorporated. The reason behind developing this hybrid is willingness to overcome the scalability problems, which are a key problem, when only one type of detectors is used. Although high-dimensional datasets are a...

متن کامل

Anomaly Detection Using Process Mining

Recently, several large companies have been involved in financial scandals related to mismanagement, resulting in financial damages for their stockholders. In response, certifications and manuals for best practices of governance were developed, and in some cases, tougher federal laws were implemented (e.g. the Sarboness Oxley Act). Companies adhered to these changes adopting the best practices ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Lecture notes in business information processing

سال: 2022

ISSN: ['1865-1348', '1865-1356']

DOI: https://doi.org/10.1007/978-3-030-98581-3_13