Process mining

Data mining technique using event logs


title: "Process mining" type: doc version: 1 created: 2026-02-28 author: "Wikipedia contributors" status: active scope: public tags: ["process-mining"] description: "Data mining technique using event logs" topic_path: "general/process-mining" source: "https://en.wikipedia.org/wiki/Process_mining" license: "CC BY-SA 4.0" wikipedia_page_id: 0 wikipedia_revision_id: 0

::summary Data mining technique using event logs ::

Process mining is a family of techniques for analyzing event data to understand and improve operational processes. Part of the fields of data science and process management, process mining is generally built on logs that contain case id, a unique identifier for a particular process instance; an activity, a description of the event that is occurring; a timestamp; and sometimes other information such as resources, costs, and so on.

There are three main classes of process mining techniques: process discovery, conformance checking, and process enhancement. In the past, terms like workflow mining and automated business process discovery (ABPD) were used.

Overview

Process mining techniques are often used when no formal description of the process can be obtained by other approaches, or when the quality of existing documentation is questionable. For example, application of process mining methodology to the audit trails of a workflow management system, the transaction logs of an enterprise resource planning system, or the electronic patient records in a hospital can result in models describing processes of organizations. Event log analysis can also be used to compare event logs with prior model(s) to understand whether the observations conform to a prescriptive or descriptive model. It is required that the event logs data be linked to a case ID, activities, and timestamps.

Contemporary management trends such as BAM (business activity monitoring), BOM (business operations management), and BPI (business process intelligence) illustrate the interest in supporting diagnosis functionality in the context of business process management technology (e.g., workflow management systems and other process-aware information systems). Process mining is different from mainstream machine learning, data mining, and artificial intelligence techniques. For example, process discovery techniques in the field of process mining try to discover end-to-end process models that are able to describe sequential, choice relation, concurrent and loop behavior. Conformance checking techniques are closer to optimization than to traditional learning approaches. However, process mining can be used to generate machine learning, data mining, and artificial intelligence problems. After discovering a process model and aligning the event log, it is possible to create basic supervised and unsupervised learning problems. For example, to predict the remaining processing time of a running case or to identify the root causes of compliance problems.

The IEEE Task Force on Process Mining was established in October 2009 as part of the IEEE Computational Intelligence Society. This is a vendor-neutral organization that aims to promote the research, development, education and understanding of process mining, make end-users, developers, consultants, and researchers aware of the state-of-the-art in process mining, promote the use of process mining techniques and tools and stimulate new applications, play a role in standardization efforts for logging event data (e.g., XES), organize tutorials, special sessions, workshops, competitions, panels, and develop material (papers, books, online courses, movies, etc.) to inform and guide people new to the field. The IEEE Task Force on Process Mining established the International Process Mining Conference (ICPM) series, lead the development of the IEEE XES standard for storing and exchanging event data, and wrote the Process Mining Manifesto which was translated into 16 languages.

History and place in data science

The term "process mining" was coined in a research proposal written by the Dutch computer scientist Wil van der Aalst. By 1999, this new field of research emerged under the umbrella of techniques related to data science and process science at Eindhoven University. In the early days, process mining techniques were often studied with techniques used for workflow management. In 2000, the first practical algorithm for process discovery, "Alpha miner" was developed. The next year, research papers introduced "Heuristic miner" a much similar algorithm based on heuristics. More powerful algorithms such as inductive miner were developed for process discovery. 2004 saw the development of "Token-based replay" for conformance checking. Process mining branched out "performance analysis", "decision mining" and "organizational mining" in 2005 and 2006. In 2007, the first commercial process mining company "Futura Pi" was established. In 2009, the IEEE task force on PM governing body was formed to oversee the norms and standards related to process mining. Further techniques for conformance checking led in 2010 to alignment-based conformance checking". In 2011, the first process mining book was published. About 30 commercially available process mining tools were available in 2018.

Categories

There are three categories of process mining techniques.

  • Process discovery: The first step in process mining. The main goal of process discovery is to transform the event log into a process model. An event log can come from any data storage system that records the activities in an organisation along with the timestamps for those activities. Such an event log is required to contain a case id (a unique identifier to recognise the case to which activity belongs), activity description (a textual description of the activity executed), and timestamp of the activity execution. The result of process discovery is generally a process model which is representative of the event log. Such a process model can be discovered, for example, using techniques such as alpha algorithm (a didactically driven approach), heuristic miner, or inductive miner. Many established techniques exist for automatically constructing process models (for example, Petri nets, BPMN diagrams, activity diagrams, State diagrams, and EPCs) based on an event log. Recently, process mining research has started targeting other perspectives (e.g., data, resources, time, etc.). One example is the technique described in (Aalst, Reijers, & Song, 2005), which can be used to construct a social network. Nowadays, techniques such as "streaming process mining" are being developed to work with continuous online data that has to be processed on the spot.
  • Conformance checking: Helps in comparing an event log with an existing process model to analyse the discrepancies between them. Such a process model can be constructed manually or with the help of a discovery algorithm. For example, a process model may indicate that purchase orders of more than 1 million euros require two checks. Another example is the checking of the so-called "four-eyes" principle. Conformance checking may be used to detect deviations (compliance checking), or evaluate the discovery algorithms, or enrich an existing process model. An example is the extension of a process model with performance data, i.e., some a priori process model is used to project the potential bottlenecks. Another example is the decision miner described in (Rozinat & Aalst, 2006b), which takes an a priori process model and analyses every choice in the process model. The event log is consulted for each option to see which information is typically available the moment the choice is made. Conformance checking has various techniques such as "token-based replay", "streaming conformance checking" that are used depending on the system needs.Then classical data mining techniques are used to see which data elements influence the choice. As a result, a decision tree is generated for each choice in the process.
  • Performance analysis: Used when there is an a priori model. The model is extended with additional performance information such as processing times, cycle times, waiting times, costs, etc., so that the goal is not to check conformance, but rather to improve the performance of the existing model with respect to certain process performance measures. An example is the extension of a process model with performance data, i.e., some prior process model dynamically annotated with performance data. It is also possible to extend process models with additional information such as decision rules and organisational information (e.g., roles).

Process mining software

Process mining software helps organizations analyze and visualize their business processes based on data extracted from various sources, such as transaction logs or event data. This software can identify patterns, bottlenecks, and inefficiencies within a process, enabling organizations to improve their operational efficiency, reduce costs, and enhance their customer experience. In 2025, Gartner listed 40 tools in its process mining platform review category.

References

References

  1. . (2015). ["Automated Business Process Discovery (ABPD)"](http://www.gartner.com/it-glossary/automated-business-process-discovery-abpd). *Gartner, Inc.*.
  2. "Gartner Top 10 Strategic Technology Trends for 2020".
  3. [https://ieeexplore.ieee.org/xpl/articleDetails.jsp?reload=true&arnumber=6679328 Kirchmer, M., Laengle, S., & Masias, V. (2013). Transparency-Driven Business Process Management in Healthcare Settings [Leading Edge]. Technology and Society Magazine, IEEE, 32(4), 14-16.]
  4. [https://books.google.com/books?id=DZ-oCgAAQBAJ&dq=process+mining+%22case+id%22+activity+timestamp&pg=PA502 Luis M. Camarinha-Matos, Frederick Benaben, Willy Picard (2015). Risks and Resilience of Collaborative Networks]
  5. [https://books.google.com/books?id=O8uEDgAAQBAJ&dq=process+mining+%22case+id%22+activity+timestamp&pg=PA483 Symeon Christodoulou, Raimar Scherer (2016). eWork and eBusiness in Architecture, Engineering and Construction: ECPPM 2016]
  6. "IEEE Task Force on Process Mining". IEEE Task Force on Process Mining.
  7. "International Process Mining Conference (ICPM) series". IEEE Task Force on Process Mining.
  8. Aalst, van der, W. M. P. (2000). Process design by discovery : Harvesting workflow knowledge from ad-hoc executions (Abstract). In M. Jarke, D. E. O'Leary, & R. Studer (Eds.), ''Knowledge Management: An Interdisciplinary Approach (Dagstuhl Seminar 00281, July 9-14, 2000)'' (Dagstuhl Seminar Proceedings; Vol. 281).
  9. [[Wil van der Aalst. Aalst, W. van der]], Weijters, A., & Maruster, L. (2004). Workflow Mining: Discovering Process Models from Event Logs. IEEE Transactions on Knowledge and Data Engineering, 16 (9), 1128–1142.
  10. Agrawal, R., Gunopulos, D., & Leymann, F. (1998). Mining Process Models from Workflow Logs. In Sixth international conference on extending database technology (pp. 469–483).
  11. Cook, J., & Wolf, A. (1998). Discovering Models of Software Processes from Event-Based Data. ACM Transactions on Software Engineering and Methodology, 7 (3), 215–249.
  12. Datta, A. (1998). Automating the Discovery of As-Is Business Process Models: Probabilistic and Algorithmic Approaches. Information Systems Research, 9 (3), 275–301.
  13. Weijters, A., & [[Wil van der Aalst. Aalst, W. van der]] (2003). Rediscovering Workflow Models from Event-Based Data using Little Thumb. Integrated Computer-Aided Engineering, 10 (2), 151–162.
  14. [[Wil van der Aalst. Aalst, W. van der]], Beer, H., & Dongen, B. van (2005). Process Mining and Verification of Properties: An Approach based on Temporal Logic. In R. Meersman & Z. T. et al. (Eds.), On the Move to Meaningful Internet Systems 2005: CoopIS, DOA, and ODBASE: OTM Confederated International Conferences, CoopIS, DOA, and ODBASE 2005 (Vol. 3760, pp. 130–147). Springer-Verlag, Berlin.
  15. Rozinat, A., & [[Wil van der Aalst. Aalst, W. van der]] (2006a). Conformance Testing: Measuring the Fit and Appropriateness of Event Logs and Process Models. In C. Bussler et al. (Ed.), BPM 2005 Workshops (Workshop on Business Process Intelligence) (Vol. 3812, pp. 163–176). Springer-Verlag, Berlin.
  16. "Best Process Mining Platforms Reviews 2025 {{!}} Gartner Peer Insights".

::callout[type=info title="Wikipedia Source"] This article was imported from Wikipedia and is available under the Creative Commons Attribution-ShareAlike 4.0 License. Content has been adapted to SurfDoc format. Original contributors can be found on the article history page. ::

process-mining