2017 IEEE International Conference on Software Maintenance and Evolution (ICSME) 2017
DOI: 10.1109/icsme.2017.71
|View full text |Cite
|
Sign up to set email alerts
|

An Experience Report on Applying Passive Learning in a Large-Scale Payment Company

Abstract: Abstract-Passive learning techniques infer graph models on the behavior of a system from large trace logs. The research community has been dedicating great effort in making passive learning techniques more scalable and ready to use by industry. However, there is still a lack of empirical knowledge on the usefulness and applicability of such techniques in large scale real systems. To that aim, we conducted action research over nine months in a large payment company. Throughout this period, we iteratively applie… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
2
2
2

Relationship

1
5

Authors

Journals

citations
Cited by 10 publications
(8 citation statements)
references
References 33 publications
0
8
0
Order By: Relevance
“…In addition, given the caused permissive verification is perceived as a risk by our interviewees, we suggest proposing possible alternatives to SSSM-IMs by investigating the order in which events are actually being called during system operation. One can consider analysing the execution traces of the generated code with pattern mining techniques widely studied in the field of model learning (Yang et al 2019;Wieman et al 2017;Aslam et al 2018), specification mining (Lemieux et al 2015;Lo et al 2011) andprocess mining (van der Aalst 2011;van der Werf et al 2009;Gupta et al 2018).…”
Section: H4mentioning
confidence: 99%
“…In addition, given the caused permissive verification is perceived as a risk by our interviewees, we suggest proposing possible alternatives to SSSM-IMs by investigating the order in which events are actually being called during system operation. One can consider analysing the execution traces of the generated code with pattern mining techniques widely studied in the field of model learning (Yang et al 2019;Wieman et al 2017;Aslam et al 2018), specification mining (Lemieux et al 2015;Lo et al 2011) andprocess mining (van der Aalst 2011;van der Werf et al 2009;Gupta et al 2018).…”
Section: H4mentioning
confidence: 99%
“…Logs are also used to build models of the software system. Tools such as Synoptic [10] and DFASAT [30,57] devise inite state machines that represent a software, based on its logs. And given that logs are often ordered in a timely manner, related work also has explored temporal invariant inference [10,41].…”
Section: Related Workmentioning
confidence: 99%
“…The analysis of logs is a widespread practice that has been studied in many diferent contexts. By leveraging log data, researchers were able to help development teams with process mining [15,29,53], anomaly detection [9,24,28,60,61], passive learning [57], fault localization [58,65], invariant inference [10], performance diagnosis [33,40,49,50,64], online trace checking [5], and behavioural analysis [4,43,62].…”
Section: Introductionmentioning
confidence: 99%
“…Two automata parts (top, bottom) comparing different behaviors of card types during payments on a pin entry device with the same firmware, learned from a random sample of 5000 transactions. For details see our companion industry track paper [36]. Using a default heuristic, such automata are typically learned within a few seconds.…”
Section: Related Workmentioning
confidence: 99%
“…The core algorithm is efficient and mature. We have applied it ourselves to a range of applications such as software bug discovery [36], modeling network traffic [37], and time series regression [24]. Now is the time to collect user feedback and improve the user experience, including the visualization and customization capabilities.…”
Section: Future Work and Conclusionmentioning
confidence: 99%