Anomaly Detection in Business Process Runtime Behavior - Challenges and Limitations.
Kristof BöhmerStefanie Rinderle-MaPublished in: CoRR (2017)
Keyphrases
- anomaly detection
- business process
- business processes
- behavior analysis
- intrusion detection
- anomalous behavior
- normal behavior
- network intrusion detection
- process model
- ws bpel
- detecting anomalies
- web services
- network traffic
- workflow model
- network anomaly detection
- intrusion detection system
- one class support vector machines
- business process models
- network security
- business process modeling
- business process management
- detecting anomalous
- negative selection algorithm
- business rules
- real world
- unsupervised learning
- data model
- user interface
- case study
- cumulative sum
- service oriented architecture
- data management
- object recognition
- learning algorithm