=Paper= {{Paper |id=Vol-3299/Paper05 |storemode=property |title=Transformer for Predictive and Prescriptive Process Monitoring in IT Service Management (Extended Abstract) |pdfUrl=https://ceur-ws.org/Vol-3299/Paper05.pdf |volume=Vol-3299 |authors=Marc C. Hennig |dblpUrl=https://dblp.org/rec/conf/icpm/Hennig22 }} ==Transformer for Predictive and Prescriptive Process Monitoring in IT Service Management (Extended Abstract)== https://ceur-ws.org/Vol-3299/Paper05.pdf
Transformer for Predictive and Prescriptive Process Monitoring
in IT Service Management (Extended Abstract)
Marc C. Hennig 1
1
    University of Applied Sciences Munich, Lothstr. 34, Munich, 80335, Germany

                 Abstract
                 Increasingly complex IT environments, requirements, and organizations in IT service
                 management make the development of advanced predictive technologies necessary. Therefore,
                 this paper outlines a Ph.D. project to develop a pipeline supporting novel IT service
                 management approaches using state-of-the-art predictive and prescriptive process monitoring
                 based on transformer neural networks.

                 Keywords1
                 IT Service Management, ITSM, AITSM, AIOps, Transformer

1. Introduction
    IT service management (ITSM) [1] is the processual approach to providing information technology
support and services assisting the key activities in organizations and therefore serving the overall
organizational goal achievement. ITSM processes define a continuous improvement process framework
[1] and operating model for IT organizations by determining services based on customer requirements
that are provided by IT infrastructure components. Legal and economic dimensions are added to the
services as contractual obligations in service level agreements (SLA). Adherence to SLAs and continual
improvement are among the core success factors in ITSM [2]. ITSM processes are complex and difficult
to analyze since they are usually embedded in a multi-layered technical and organizational landscape
with a high level of specialization [3], [4].
    Two emerging fields are assisting in the successful provision of IT services: artificial intelligence-
driven ITSM (AITSM) [5] and artificial intelligence for IT operations (AIOps) [6]. AIOps is a data-
driven approach for analyzing data to provide operators with the information required to operate
complex IT systems efficiently. At the same time, AITSM is the automation, support, and improvement
of ITSM processes using machine learning (ML). Insights into processes are important requirements in
both approaches.

2. Motivation and Problem
   As a collection of interconnected processes embedded in a multi-faceted environment, ITSM is
challenged by different stakeholders and demands that must be aligned. Therefore, process instances in
ITSM are often characterized by a high degree of flexibility, dependencies, and knowledge intensity,
which are necessary to react to disruptions and changes in services and the socio-technological IT
organization. The organization comprises so-called configuration items (CI), which are mainly human
resources with their responsibilities and hard- and software components. The configuration
management database (CMDB) is one of the core elements in an ITSM ecosystem and contains
information regarding CIs and their interdependencies and hence offers valuable contextual
information. In ITSM, especially the assessment and improvement of the processes and their proper
orchestration are central pain points since extracting practical insights on the processes are difficult to
obtain which hinders process maturity and hence the service resilience and quality [4], [5]. CMDBs

ICPM 2022 Doctoral Consortium and Tool Demonstration Track, October 23–28, 2022, Bolzano, Italy
EMAIL: mhennig@hm.edu
              ©️ 2022 Copyright for this paper by its authors.
              Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0).
              CEUR Workshop Proceedings (CEUR-WS.org)




                                                                                  22
have been used to analyze some parts of ITSM processes [7]–[9] but have not yet been systematically
utilized in combination with event log data.
    Due to the unique properties of ITSM processes as complex service processes, this Ph.D. project
shall enable transformer neural networks [10] in ITSM and establish a connection between predictive
and prescriptive process monitoring and the intersecting fields of AIOps and AITSM. This is
particularly interesting since the results which are usually delivered by process monitoring
solutions [11], including the next event, its point of occurrence, and the overall duration of a process
instance are valuable insights for these fields to provide operational support. Furthermore, concrete
recommendations and interactive optimizations on these variables can be derived using prescriptive
process monitoring [12] to enable improvements in ongoing instances. Despite the thematic overlaps
between predictive and prescriptive process monitoring, AIOps, and AITSM, systematic studies on the
intersection are missing.
    Predictive and prescriptive process monitoring could benefit from transformer models, a relatively
novel approach in ML mainly used in natural language processing (NLP) and other sequence-related
tasks. They have outperformed traditional recurrent neural networks and their derivatives in several
areas. However, in predictive and prescriptive process monitoring, transformers have only been covered
sparsely so far [12]–[14].
    Hence, this project aims to understand the fields AITSM and AIOps as novel approaches in ITSM
and to integrate predictive and prescriptive process monitoring based on transformer models therein.

3. Research Questions
    The success factors for ITSM, as outlined in the previous sections, namely the ability to conform to
predefined time and quality-bound SLAs, are directly influenced by process intelligence and the ability
to derive actionable insights.
    To address these challenges, an end-to-end pipeline for process monitoring using transformer
models shall be envisioned, which initiates three research questions. First, the data must be collected
and preprocessed; second, the event log must be fed into the transformer model to receive predictions;
finally, workable insights should be derived. The insights should benefit the service quality by
providing operators with immediate AIOps information to handle events and long-term AITSM support
to foster change, resilience, and improvement across the service’s life cycle.
    Initially, there is the collection and preprocessing of the data, including the extraction and
preparation of information from concurrent process instances, like incident management and change
management, and other ITSM sources, e.g., the graph-like CMDBs. The inclusion of exogenous data
[15], [16] in addition to the event log is deemed necessary to fully capture how an IT organization’s
performance is affected by the workload and events occurring in different processes and process
instances and to identify the key influence factors of service resilience and performance. Additionally,
this might be required to attain a sufficient model quality [17]. Therefore, it must be figured out how
the data can be optimally prepared for predictive tasks in transformer models and how event data and
contextual information from other sources like CMDBs can be integrated.

   Research Question 1: What is the proper way to collect and preprocess the event log to account for
the complexities of ITSM processes and leverage additional data sources like CMDBs to allow for
further processing in transformer models?

    Secondly, an architecture using transformer models is to be developed based on the previous
research [13], [14]. This architecture should accommodate the event logs’ unique sequential properties
and underlying processes. Specifically, the non-continuous time and the non-equidistant time intervals
between the discrete events make processes different from usual timelines and pose an interesting
challenge for transformers. Other approaches than the often-used positional embedding and a special
trace encoding [18] might be necessary to make the dependencies between activities and timestamps
workable for transformer models [19].




                                                   23
   Research Question 2: How can a transformer architecture be designed to be suitable for ITSM event
logs and additional data sources to provide predictions and optimizations with continuously generated
events from real-world applications?

   Finally, the core factors influencing the performance of process instances in ITSM must be detected
based on the data, hence adding explanations to the mostly black box [20] results of transformer models.
Explainability is essential to enable proactive improvement of the process, the organization, and the
analysis of problem sources [21], which has not yet been achieved in prescriptive process
monitoring [12].

   Research Question 3: How can the root causes impacting the performance within process instances
be derived from complementing the predictions and be used for continuous improvement and
operational support?

   The results of these steps shall then be combined into a pipeline for process monitoring on ITSM
event logs that can be used to support IT operations as an AITSM and AIOps solution.

4. Research Methodology
    This Ph.D. project will follow the design science research process [22]. The different research
questions will be worked on iteratively to individually create tangible artifacts and assess their impact
on the predictive performance of transformers. The development of artifacts starts with the
preprocessing, progresses to the model that provides descriptive predictions, and finalizes with the
extraction of explanatory insights.
    First, the exact challenges of each research question will be identified in detail to infer tangible
objectives, which serve as the base for the requirement definition and tracking of goal attainment. These
objectives are then synthesized into a system design employing literature research from online databases
to extract the latest field findings. During the literature analysis, recent and relevant conference papers
will be preferred, followed by other publications and preprints. This literature research will draw special
attention to other ML domains, like NLP, to see whether knowledge from these areas can be leveraged
in this use case.
    The theoretical views on the problem and system design are subsequently used to develop the
artifacts and establish a practical understanding of the narrowed problems defined by the research
questions and their solutions. The artifacts will then be demonstrated on real-world data to prove their
applicability and usefulness to the problem domain.
    To conclude the projected approach, the artifacts are tested using evaluation strategies appropriate
for the artifacts [23]. The evaluation includes the use of quality measures for ML tasks to ensure that
the training and results are valid. In benchmarks against other published and available ML models in
predictive and prescriptive process monitoring, it will be verified whether improvements could be
reached. The evaluation shall be done on different event logs to ensure the applicability and
transferability of the models. Finally, the artifact is evaluated from a functional perspective by
comparing the defined aims and requirements with the created artifact to ensure the goals are reached.

5. References
[1]   M. Marrone and L. M. Kolbe, “Uncovering ITIL claims: IT executives’ perception on benefits
      and Business-IT alignment,” Inf Syst E-Bus Manage, vol. 9, no. 3, pp. 363–380, Sep. 2011, doi:
      10.1007/s10257-010-0131-7.
[2]   Yajun Zhang, Jinlong Zhang, and Jiangtao Chen, “Critical Success Factors in IT Service
      Management Implementation: People, Process, and Technology Perspectives,” in 2013
      International Conference on Service Sciences (ICSS), Shenzhen, Apr. 2013, pp. 64–68. doi:
      10.1109/ICSS.2013.38.




                                                    24
[3]  S. Morana, T. Gerards, and A. Mädche, “ITSM ProcessGuide – A Process Guidance System for
     IT Service Management,” in New Horizons in Design Science: Broadening the Research Agenda,
     Cham, 2015, vol. 9073, pp. 406–410. doi: 10.1007/978-3-319-18714-3_32.
[4] J. Serrano, J. Faustino, D. Adriano, R. Pereira, and M. da Silva, “An IT Service Management
     Literature Review: Challenges, Benefits, Opportunities and Implementation Practices,”
     Information, vol. 12, no. 3, p. 111, Mar. 2021, doi: 10.3390/info12030111.
[5] H. Mao, T. Zhang, and Q. Tang, “Research Framework for Determining How Artificial
     Intelligence Enables Information Technology Service Management for Business Model
     Resilience,” Sustainability, vol. 13, no. 20, p. 11496, Oct. 2021, doi: 10.3390/su132011496.
[6] Y. Dang, Q. Lin, and P. Huang, “AIOps: Real-World Challenges and Research Innovations,” in
     2019 IEEE/ACM 41st International Conference on Software Engineering: Companion
     Proceedings (ICSE-Companion), Montreal, QC, Canada, May 2019, pp. 4–5. doi: 10.1109/ICSE-
     Companion.2019.00023.
[7] M. Sarnovsky and J. Surma, “Predictive Models for Support of Incident Management Process in
     IT Service Management,” AEI, vol. 18, no. 1, pp. 57–62, Mar. 2018, doi: 10.15546/aeei-2018-
     0009.
[8] P. Anchuri et al., “Graph mining for discovering infrastructure patterns in configuration
     management databases,” Knowl Inf Syst, vol. 33, no. 3, pp. 491–522, Dec. 2012, doi:
     10.1007/s10115-012-0528-3.
[9] Haochen Li and Zhiqiang Zhan, “Bussiness-driven automatic IT change management based on
     machine learning,” in 2012 IEEE Network Operations and Management Symposium, Maui, HI,
     Apr. 2012, pp. 1374–1377. doi: 10.1109/NOMS.2012.6212078.
[10] A. Vaswani et al., “Attention is All you Need,” in Advances in Neural Information Processing
     Systems 30, Long Beach, CA, USA, Dec. 2017, vol. 30, pp. 5998–6008.
[11] C. Di Francescomarino, C. Ghidini, F. M. Maggi, and F. Milani, “Predictive Process Monitoring
     Methods: Which One Suits Me Best?,” in Business Process Management, Cham, Switzerland,
     2018, vol. 11080, pp. 462–479. doi: 10.1007/978-3-319-98648-7_27.
[12] K. Kubrak, F. Milani, A. Nolte, and M. Dumas, “Prescriptive process monitoring: Quo vadis?,”
     PeerJ Computer Science, vol. 8, no. 1097, Sep. 2022, doi: 10.7717/peerj-cs.1097.
[13] Z. A. Bukhsh, A. Saeed, and R. M. Dijkman, “ProcessTransformer: Predictive Business Process
     Monitoring with Transformer Network.” arXiv, Apr. 01, 2021. Accessed: Feb. 11, 2022. [Online].
     Available: http://arxiv.org/abs/2104.00721
[14] P. Philipp, R. Jacob, S. Robert, and J. Beyerer, “Predictive Analysis of Business Processes Using
     Neural Networks with Attention Mechanism,” in 2020 International Conference on Artificial
     Intelligence in Information and Communication (ICAIIC), Fukuoka, Japan, Feb. 2020, pp. 225–
     230. doi: 10.1109/ICAIIC48513.2020.9065057.
[15] A. Banham, S. J. J. Leemans, M. T. Wynn, and R. Andrews, “xPM: A Framework for Process
     Mining with Exogenous Data,” in Process Mining Workshops, Eindhoven, Netherlands, 2022,
     vol. 433, pp. 85–97. doi: 10.1007/978-3-030-98581-3_7.
[16] A. Banham, S. J. J. Leemans, M. T. Wynn, R. Andrews, K. B. Laupland, and L. Shinners, “xPM:
     Enhancing exogenous data visibility,” Artificial Intelligence in Medicine, vol. 133, p. 102409,
     Nov. 2022, doi: 10.1016/j.artmed.2022.102409.
[17] F. Folino, M. Guarascio, and L. Pontieri, “Discovering High-Level Performance Models for
     Ticket Resolution Processes,” in On the Move to Meaningful Internet Systems: OTM 2013
     Conferences, Graz, Austria, 2013, vol. 8185, pp. 275–282. doi: 10.1007/978-3-642-41030-7_18.
[18] S. Barbon Junior, P. Ceravolo, E. Damiani, and G. Marques Tavares, “Evaluating Trace Encoding
     Methods in Process Mining,” in From Data to Models and Back, Cham, 2021, vol. 12611, pp.
     174–189. doi: 10.1007/978-3-030-70650-0_11.
[19] H. Mei, C. Yang, and J. Eisner, “Transformer Embeddings of Irregularly Spaced Events and Their
     Participants,” in The Tenth International Conference on Learning Representations, Sep. 2021.
     Accessed: May 04, 2022. [Online]. Available: https://openreview.net/forum?id=Rty5g9imm7H
[20] R. Galanti, B. Coma-Puig, M. de Leoni, J. Carmona, and N. Navarin, “Explainable Predictive
     Process Monitoring,” in 2020 2nd International Conference on Process Mining (ICPM), Padua,
     Italy, Oct. 2020, pp. 1–8. doi: 10.1109/ICPM49681.2020.00012.




                                                  25
[21] A. Terra, R. Inam, S. Baskaran, P. Batista, I. Burdick, and E. Fersman, “Explainability Methods
     for Identifying Root-Cause of SLA Violation Prediction in 5G Network,” in 2020 IEEE Global
     Communications       Conference,      Taipei,   Taiwan,     Dec.    2020,    pp.    1–7.    doi:
     10.1109/GLOBECOM42002.2020.9322496.
[22] P. Johannesson and E. Perjons, An Introduction to Design Science, 2nd ed. Cham: Springer
     International Publishing, 2021. doi: 10.1007/978-3-030-78132-3.
[23] J. Venable, J. Pries-Heje, and R. Baskerville, “FEDS: a Framework for Evaluation in Design
     Science Research,” European Journal of Information Systems, vol. 25, no. 1, pp. 77–89, Jan.
     2016, doi: 10.1057/ejis.2014.36.




                                                 26