An Anomaly-Based Approach for Detecting Modularity Violations on Method Placement

被引:0
|
作者
Yoda, Kazuki [1 ]
Nakamaru, Tomoki [1 ]
Akiyama, Soramichi [2 ]
Chiba, Shigeru [1 ]
机构
[1] Univ Tokyo, Bunkyo Ku, Tokyo, Japan
[2] Ritsumeikan Univ, Shiga, Japan
关键词
code review; refactoring; packages; !text type='Java']Java[!/text; few-shot classification; nerual networks;
D O I
10.1109/QRS57517.2022.00038
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This paper presents a technique for detecting an anomaly in method placements in Java packages. This anomaly detection helps code reviewers discover a method belonging to an inappropriate package in modularity when developers commit changes in their software development projects. Moving such a method to an appropriate package will contribute to the maintenance of good modularity in their projects. This is particularly beneficial in the later stage of development, where modularity is often violated by adding new features not anticipated in the initial plan. Our technique is based on fewshot classification in machine learning. This paper empirically reveals that our neural network model can detect an anomaly in method placements and a significant portion of the anomalies is considered as inappropriate method placements in modularity. Our model can discover even a method placement that violates a project-specific coding rule that its developers would choose for some reason of maintainability or readability. Our technique is useful for maintaining the consistency in such a project-specific rule.
引用
收藏
页码:287 / 298
页数:12
相关论文
共 50 条
  • [21] An efficient hybrid SVDD/Clustering approach for anomaly-based intrusion detection
    Kenaza, Tayeb
    Bennaceur, Khadidja
    Labed, Abdenour
    33RD ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, 2018, : 435 - 443
  • [22] An unsupervised anomaly-based detection approach for integrity attacks on SCADA systems
    Almalawi, Abdulmohsen
    Yu, Xinghuo
    Tari, Zahir
    Fahad, Adil
    Khalil, Ibrahim
    COMPUTERS & SECURITY, 2014, 46 : 94 - 110
  • [23] Anomaly-Based Intrusion Detection Using Machine Learning: An Ensemble Approach
    Lalduhsaka R.
    Bora N.
    Khan A.K.
    International Journal of Information Security and Privacy, 2022, 16 (01):
  • [24] Collaborative anomaly-based attack detection
    Gamer, Thomas
    Scharf, Michael
    Schoeller, Marcus
    SELF-ORGANIZING SYSTEMS, PROCEEDINGS, 2007, 4725 : 280 - +
  • [25] An algorithm for anomaly-based botnet detection
    Binkley, James R.
    Singh, Suresh
    USENIX ASSOCIATION PROCEEDINGS OF THE 2ND WORKSHOP ON STEPS TO REDUCING UNWANTED TRAFFIC ON THE INTERNET, 2006, : 43 - +
  • [26] A clustering method for improving performance of anomaly-based intrusion detection system
    Song, Jungsuk
    Ohira, Kenji
    Takakura, Hiroki
    Okabe, Yasuo
    Kwon, Yongjin
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2008, E91D (05) : 1282 - 1291
  • [27] AN ANOMALY-BASED WEB APPLICATION FIREWALL
    Torrano-Gimenez, Carmen
    Perez-Villegas, Alejandro
    Alvarez, Gonzalo
    SECRYPT 2009: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2009, : 23 - 28
  • [28] Benchmarking anomaly-based detection systems
    Maxion, RA
    Tan, KMC
    DSN 2000: INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2000, : 623 - 630
  • [29] A data-driven sensor placement approach for detecting voltage violations in distribution systems
    Buason, Paprapee
    Misra, Sidhant
    Talkington, Samuel
    Molzahn, Daniel K.
    ELECTRIC POWER SYSTEMS RESEARCH, 2024, 232
  • [30] Anomaly-based model for detecting HTTP-tunnel traffic using network behavior analysis
    李世淙
    Yun Xiaochun
    Zhang Yongzheng
    High Technology Letters, 2014, 20 (01) : 63 - 69