Detecting anomaly in the usage of database attribute

Kaiping Liu, Hee Beng Kuan Tan, Arnatovich Yauhen Leanidavich

Research output: Contribution to journalConference articlepeer-review

Abstract

In database applications, database operations should be provided to maintain persistency of the data which is often represented as database attributes. Any missing, redundant or inconsistent operation performed on database attributes would indicate anomaly or even program bugs. Through characterizing operations performed in database transactions on database attributes, we extract a feature vector from code for each attribute. This paper proposes a clustering-based approach which analyzes the feature vectors to automatically detect anomalies in the usage of database attributes. Once an anomaly is detected, developers can perform investigation to take corrective actions if necessary. The evaluations on both industrial and open source database applications show that our approach is able to detect many types of anomalies in the usage of database attributes with a high detection rate (92.8% on average), and a low false positive rate (0.57% on average).

Original languageEnglish
Pages (from-to)705-710
Number of pages6
JournalProceedings of the International Conference on Software Engineering and Knowledge Engineering, SEKE
Volume2014-January
Issue numberJanuary
Publication statusPublished - 2014
Externally publishedYes
Event26th International Conference on Software Engineering and Knowledge Engineering, SEKE 2014 - Vancouver, Canada
Duration: 1 Jul 20143 Jul 2014

Keywords

  • Anomaly detection
  • Attribute usage
  • Clustering
  • Database application

Fingerprint

Dive into the research topics of 'Detecting anomaly in the usage of database attribute'. Together they form a unique fingerprint.

Cite this