Advertisement

Supporting the Selection of Constraints for Requirements Monitoring from Automatically Mined Constraint Candidates

  • Thomas KrismayerEmail author
  • Peter Kronberger
  • Rick Rabiser
  • Paul Grünbacher
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11412)

Abstract

[Context and Motivation] Existing approaches, e.g., in the areas of specification mining and process mining, allow to automatically identify requirements-level system properties, that can then be used for verifying or monitoring systems. For instance, specifications, invariants, or constraints can be mined by analyzing source code or system logs. [Question/Problem] However, the usefulness of mining approaches is currently limited by (i) the typically high number of mined properties and (ii) the often high number of false positives that are mined from complex systems. [Principal Ideas/Results] In this paper, we present an approach that supports domain experts in selecting constraints for requirements monitoring by grouping, filtering, and ranking constraint candidates mined from event logs. [Contributions] Our tool-supported approach is flexible and extensible and allows users to experiment with different thresholds, configurations, and ranking algorithms to ease the selection of useful constraints. We demonstrate the usefulness and scalability of our approach by applying it to constraints mined from event logs of two complex real-world systems: a plant automation system and a cyber-physical system controlling unmanned aerial vehicles.

Keywords

Requirements monitoring Specification mining Constraint selection 

Notes

Acknowledgments

The financial support by the Austrian Federal Ministry for Digital and Economic Affairs, the National Foundation for Research, Technology and Development, and Primetals Technologies is gratefully acknowledged.

References

  1. 1.
    Cleland-Huang, J., Vierhauser, M., Bayley, S.: Dronology: an incubator for cyber-physical systems research. In: Proceedings of the 40th International Conference on Software Engineering: New Ideas and Emerging Results, pp. 109–112. ACM (2018)Google Scholar
  2. 2.
    Cormen, T.H., Leiserson, C.E., Rivest, R.L., Stein, C.: Introduction to Algorithms. MIT Press, Cambridge (2009)zbMATHGoogle Scholar
  3. 3.
    Ernst, M., et al.: The Daikon system for dynamic detection of likely invariants. Sci. Comput. Program. 69(1), 35–45 (2007)MathSciNetzbMATHGoogle Scholar
  4. 4.
    Fahad, A., et al.: A survey of clustering algorithms for big data: taxonomy and empirical analysis. IEEE Trans. Emerg. Top. Comput. 2(3), 267–279 (2014)Google Scholar
  5. 5.
    Gabel, M., Su, Z.: Javert: fully automatic mining of general temporal properties from dynamic traces. In: Proceedings of the 16th ACM SIGSOFT International Symposium on Foundations of Software Engineering, pp. 339–349. ACM (2008)Google Scholar
  6. 6.
    Krismayer, T.: Automatic mining of constraints for monitoring systems of systems. In: Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, pp. 924–927. ACM (2018)Google Scholar
  7. 7.
    Krismayer, T., Rabiser, R., Grünbacher, P.: Mining constraints for event-based monitoring in systems of systems. In: Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, pp. 826–831. IEEE (2017)Google Scholar
  8. 8.
    Lemieux, C., Park, D., Beschastnikh, I.: General LTL specification mining (T). In: Proceedings of the 30th IEEE/ACM International Conference on Automated Software Engineering, pp. 81–92. IEEE (2015)Google Scholar
  9. 9.
    Lo, D., Khoo, S.C., Han, J., Liu, C.: Mining Software Specifications: Methodologies and Applications. CRC Press, Boca Raton (2011)Google Scholar
  10. 10.
    Lo, D., Maoz, S.: Scenario-based and value-based specification mining: better together. Autom. Softw. Eng. 19(4), 423–458 (2012)Google Scholar
  11. 11.
    Maita, A.R.C., et al.: A systematic mapping study of process mining. Enterp. Inf. Syst. 12(5), 505–549 (2018)Google Scholar
  12. 12.
    Narayan, A., Cutulenco, G., Joshi, Y., Fischmeister, S.: Mining timed regular specifications from system traces. ACM Trans. Embed. Comput. Syst. 17(2), 46:1–46:21 (2018)Google Scholar
  13. 13.
    Rabiser, R., Thanhofer-Pilisch, J., Vierhauser, M., Grünbacher, P., Egyed, A.: Developing and evolving a DSL-based approach for runtime monitoring of systems of systems. Autom. Softw. Eng. 25(4), 875–915 (2018)Google Scholar
  14. 14.
    Robinson, W.: A requirements monitoring framework for enterprise systems. Requirements Eng. 11(1), 17–41 (2006)Google Scholar
  15. 15.
    Shoham, S., Yahav, E., Fink, S.J., Pistoia, M.: Static specification mining using automata-based abstractions. IEEE Trans. Softw. Eng. 34(5), 651–666 (2008)Google Scholar
  16. 16.
    van der Aalst, W., et al.: Process mining manifesto. In: Daniel, F., Barkaoui, K., Dustdar, S. (eds.) BPM 2011. LNBIP, vol. 99, pp. 169–194. Springer, Heidelberg (2012)Google Scholar
  17. 17.
    Vierhauser, M., Rabiser, R., Grünbacher, P.: Requirements monitoring frameworks: a systematic review. Inf. Softw. Technol. 80(December), 89–109 (2016)Google Scholar
  18. 18.
    Vierhauser, M., Rabiser, R., Grünbacher, P., Aumayr, B.: A requirements monitoring model for systems of systems. In: Proceedings of the 23rd IEEE International Requirements Engineering Conference, pp. 96–105. IEEE (2015)Google Scholar
  19. 19.
    Vierhauser, M., Rabiser, R., Grünbacher, P., Seyerlehner, K., Wallner, S., Zeisel, H.: ReMinds: a flexible runtime monitoring framework for systems of systems. J. Syst. Softw. 112, 123–136 (2016)Google Scholar
  20. 20.
    Weimer, W., Necula, G.C.: Mining temporal specifications for error detection. In: Halbwachs, N., Zuck, L.D. (eds.) TACAS 2005. LNCS, vol. 3440, pp. 461–476. Springer, Heidelberg (2005)zbMATHGoogle Scholar
  21. 21.
    Xu, R., Wunsch, D.: Survey of clustering algorithms. IEEE Trans. Neural Netw. 16(3), 645–678 (2005)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Thomas Krismayer
    • 1
    Email author
  • Peter Kronberger
    • 1
  • Rick Rabiser
    • 1
  • Paul Grünbacher
    • 1
  1. 1.Christian Doppler Laboratory MEVSS, Institute for Software Systems EngineeringJohannes Kepler University LinzLinzAustria

Personalised recommendations