2018 IEEE Workshop on Machine Learning Techniques for Software Quality Evaluation (MaLTeSQuE) 2018
DOI: 10.1109/maltesque.2018.8368453
|View full text |Cite
|
Sign up to set email alerts
|

Machine learning-based run-time anomaly detection in software systems: An industrial evaluation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(8 citation statements)
references
References 16 publications
0
7
0
Order By: Relevance
“…Added to the originality to the proposed learning method compared to other machine learning methods, it is giving very high accuracy in general. In [1], even not applied with our same tested programs, the learning-based run-time anomaly detection in software systems detects 70% of anomalies. We could not observe a code or data change if it does not contaminate the state of the program.…”
Section: Validation Of the Methods And Its Limitmentioning
confidence: 97%
See 2 more Smart Citations
“…Added to the originality to the proposed learning method compared to other machine learning methods, it is giving very high accuracy in general. In [1], even not applied with our same tested programs, the learning-based run-time anomaly detection in software systems detects 70% of anomalies. We could not observe a code or data change if it does not contaminate the state of the program.…”
Section: Validation Of the Methods And Its Limitmentioning
confidence: 97%
“…This might be explained logically as well: in fact, pattern (1-2) reflects a swapping of two elements in the trace 1 giving trace 2. Pattern (2-3) reflects a swapping of two elements in the trace 2 giving 3, then pattern (1,3) represents the two consecutive swaps. Together patterns (1)(2) and (2)(3) represent the concept corresponding to (1,3) because it included all "1"s in (1-2) and (2-3) only.…”
Section: ) Detecting Anomaliesmentioning
confidence: 99%
See 1 more Smart Citation
“…The artificial neural network was used to train our network and get the results. Mitrokotsa et al (2007) Huch et al (2018) present a machine learning based anomaly behaviour detection mechanism to predict a system's health. This research proves that regular neural networks with long short-term memory (LSTM) are more effective in sensing irregularities than other classifiers.…”
Section: Intrusion Detection Using Neural Network In Healthcarementioning
confidence: 99%
“…Enterprise software system anomalies: This dataset was collected between August 2014 and October 2015 by Huch et al [43] in a real-world industrial setting-monitoring 20 instances of a complex enterprise application-to test the feasibility of machine learning-based anomaly detection at runtime. The dataset consists of 831 metrics in 1-minute time intervals (in total 7.5 × 10 6 data points), and contains time series data about the operating system, database connections and transactions, memory and CPU usage and many other metrics.…”
mentioning
confidence: 99%