의사결정나무를 이용한 비즈니스 프로세스의 실시간 위험 수준 측정

Real-time Risk Measurement of Business Process Using Decision Tree

  • 강복영 (서울대학교 산업공학과) ;
  • 조남욱 (서울산업대학교 산업정보시스템공학과) ;
  • 김훈태 (대진대학교 산업시스템공학과) ;
  • 강석호 (서울대학교 산업공학과)
  • Kang, Bok-Young (Department of Industrial Engineering, Seoul National University) ;
  • Cho, Nam-Wook (Department of Industrial and Information System Engineering, Seoul National University of Technology) ;
  • Kim, Hoon-Tae (Department of Industrial and Systems Engineering, Daejin University) ;
  • Kang, Suk-Ho (Department of Industrial Engineering, Seoul National University)
  • 발행 : 2008.12.31

초록

This paper proposes a methodology to measure the risk level in real-time for Business Activity Monitoring (BAM). A decision-tree methodology was employed to analyze the effect of process attributes on the result of the process execution. In the course of process execution, the level of risk is monitored in real-time, and an early warning can be issued depending on the change of the risk level. An algorithm for estimating the risk of ongoing processes in real-time was formulated. Comparison experiments were conducted to demonstrate the effectiveness of our method. The proposed method detects the risks of business processes more precisely and even earlier than existing approaches.

키워드

참고문헌

  1. 손성호, 정재윤, 조남욱, 강석호; "프로세스 기반 이 벤트 분석을 이용한 비즈니스 활동 모니터링", 한국전자거래학회지, 12 : 219-231, 2007
  2. Abadeh, M. S., Habibi, J., Barzegar, Z., and Sergi, M.; "A parallel genetic local search algorithm for intrusion detection in computer networks," Engineering Applications of Artificial Intelligence, 20(8) : 1058-1069, 2007 https://doi.org/10.1016/j.engappai.2007.02.007
  3. Adams, P.; "What's going on? [business activity monitoring]," Manufacturing Engineer, 81(6) : 282-283, 2002 https://doi.org/10.1049/me:20020611
  4. Adi, A., Botzer, D., and Etzion, O.;"Semantic Event Model and Its Implication on Situation Detection," Proceedings of the 2000 European Conference on Information, 2000
  5. Albaghdadi, M., Briley, B., and Evens, M.; "Event storm detection and identification in communication systems," Reliability Engineering and System Safety, 91 (5) : 602-613, 2006 https://doi.org/10.1016/j.ress.2005.05.001
  6. Camci, F. and Chinnam, R. B.; "General support vector representation machine for one-class classification of non-stationary classes," Pattern Recognition, 41(10) : 3021-3034, 2008 https://doi.org/10.1016/j.patcog.2008.04.001
  7. Duda, R. O., Hart, P. E. and Stork, D. G.; Pattern Classification, Wiley-interscience, 2001
  8. Golfarelli, M., Rizzi, S., and Cella, I.; "Beyond data warehousing : what's next in business intelligence?," Proceedings of the 7th ACM international workshop on Data warehousing and OLAP, : 1-6, 2004
  9. Grigori, D., Casati, F., Castellanos, M., Dayal, U., Sayal, M., and Shan, M-C.; "Business Process Intelligence," Computers in Industry, 53 : 321-343, 2004 https://doi.org/10.1016/j.compind.2003.10.007
  10. Gross, P. N., Gupta, S., Kasier, G. E., Gaurav, S. K., and Parekh, J. J.; "An Active Events Model for Systems Monitoring," Working Conference on Complex and Dynamic Systems, 2001
  11. Lamport, L.; "Time, Clocks, and the Ordering of Events in a Distributed System," Communications of the ACM, 21(7) : 558-565, 1978 https://doi.org/10.1145/359545.359563
  12. Leymann, F., Roller, D., and Schmidt, M-T.; "Web Services and Business Process Management," IBM Systems Journal, 41(2), 2002
  13. Luckham, D. C.; The Power of Events, Person Education, 2002
  14. Luckham, D. C. and Frasca, B.; "Complex Event Processing in Distributed Systems," Stanford University, 1998
  15. Lundberg, A.; "Leverage Complex Event Processing to Improve Operational Performance," Business Intelligence, 11(1) : 55-65, 2006
  16. Mendling, J., Verbeek, H. M. W., van Dongen, B. F., van der Aalst, W. M. P., and Neumann, G.; "Detection and prediction of errorsin EPCs of the SAP reference model," Data and Knowledge Engineering, 64(1) : 312-329, 2008 https://doi.org/10.1016/j.datak.2007.06.019
  17. Perrochon, L., Mann, W., Kasriel, S., and Luckham, D. C.; "Event Mining with Event Processing Networks," Proceedings of Methodologies for Knowledge Discovery and Data Mining : Third Pacific-Asia Conference, 1574 : 474-478, 1999
  18. Rolland, C.; "Modeling the Requirements Engineering Process," 3rd European-Japanese Seminar on Information Modelling and Knowledge Bases, 1993
  19. Sharma, A., Pujari, A. K., and Paliwal, K. K.; "Intrusion detection using text processing techniques with a kernel based similarity measure," Computers and Security, 26 : 488-495, 2007 https://doi.org/10.1016/j.cose.2007.10.003
  20. Wang D. and Romagnoli, J. A.; "Robust multi-scale principal components analysis with applications to process monitoring," Journal of Process Control, 15(8) : 869-882, 2005 https://doi.org/10.1016/j.jprocont.2005.04.001
  21. Mitchell, T. M.; Machine Learning, McGraw-Hill, Inc., New York, 1997