An Anomaly-Based Approach for Detecting Modularity Violations on Method Placement

被引:0
|
作者
Yoda, Kazuki [1 ]
Nakamaru, Tomoki [1 ]
Akiyama, Soramichi [2 ]
Chiba, Shigeru [1 ]
机构
[1] Univ Tokyo, Bunkyo Ku, Tokyo, Japan
[2] Ritsumeikan Univ, Shiga, Japan
关键词
code review; refactoring; packages; !text type='Java']Java[!/text; few-shot classification; nerual networks;
D O I
10.1109/QRS57517.2022.00038
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This paper presents a technique for detecting an anomaly in method placements in Java packages. This anomaly detection helps code reviewers discover a method belonging to an inappropriate package in modularity when developers commit changes in their software development projects. Moving such a method to an appropriate package will contribute to the maintenance of good modularity in their projects. This is particularly beneficial in the later stage of development, where modularity is often violated by adding new features not anticipated in the initial plan. Our technique is based on fewshot classification in machine learning. This paper empirically reveals that our neural network model can detect an anomaly in method placements and a significant portion of the anomalies is considered as inappropriate method placements in modularity. Our model can discover even a method placement that violates a project-specific coding rule that its developers would choose for some reason of maintainability or readability. Our technique is useful for maintaining the consistency in such a project-specific rule.
引用
收藏
页码:287 / 298
页数:12
相关论文
共 50 条
  • [1] An Anomaly-Based Approach for Detecting Modularity Violations on Method Placement
    Yoda, Kazuki
    Nakamaru, Tomoki
    Akiyama, Soramichi
    Chiba, Shigeru
    IEEE International Conference on Software Quality, Reliability and Security, QRS, 2022, 2022-December : 287 - 298
  • [2] Swaddler: An approach for the anomaly-based detection of state violations in web applications
    Cova, Marco
    Balzarotti, Davide
    Felmetsger, Viktoria
    Vigna, Giovanni
    RECENT ADVANCES IN INTRUSION DETECTION, PROCEEDINGS, 2007, 4637 : 63 - +
  • [3] Anomaly-Based Method for Detecting Multiple Classes of Network Attacks
    Gurina, Anastasia
    Eliseev, Vladimir
    INFORMATION, 2019, 10 (03)
  • [4] A General Purpose Anomaly-Based Method for Detecting Cheaters in Online Courses
    Alexandron, Giora
    Berg, Aviram
    Ruiperez-Valiente, Jose A.
    IEEE TRANSACTIONS ON LEARNING TECHNOLOGIES, 2024, 17 : 1 - 11
  • [5] Detecting Software Modularity Violations
    Wong, Sunny
    Cai, Yuanfang
    Kim, Miryung
    Dalton, Michael
    2011 33RD INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE), 2011, : 411 - 420
  • [6] Detecting novel steganography with an anomaly-based strategy
    Jackson, JT
    Gunsch, GH
    Claypoole, RL
    Lamont, GB
    JOURNAL OF ELECTRONIC IMAGING, 2004, 13 (04) : 860 - 870
  • [7] Anomaly-Based Intrusion Detection for Detecting Blackhole Attack Mitigataion
    Abdelhamid, Ashraf
    Elsayed, Mahmoud Said
    Aslan, Heba K.
    Azer, Marianne A.
    19TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY, ARES 2024, 2024,
  • [8] An Anomaly-Based IDS for Detecting Attacks in RPL-Based Internet of Things
    Farzaneh, Behnam
    Montazeri, Mohammad Ali
    Jamali, Shahram
    2019 5TH INTERNATIONAL CONFERENCE ON WEB RESEARCH (ICWR), 2019, : 61 - 66
  • [9] Game Theoretical Method for Anomaly-Based Intrusion Detection
    Wang, Zhiyong
    Xu, Shengwei
    Xu, Guoai
    Yin, Yongfeng
    Zhang, Miao
    Sun, Dawei
    SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [10] Integrating Anomaly-Based Approach into Bayesian Network Classifiers
    Benferhat, Salem
    Tabia, Karim
    E-BUSINESS AND TELECOMMUNICATIONS, 2009, 48 : 127 - 139