Yazılım Hata Logları Kullanılarak Veri Madenciliği Uygulaması Gerçekleştirilmesi

Veri madenciliği; genellikle makine öğrenmesi tekniklerini kullanarak önceden bilinmeyen verilerden bilgi çıkarma sürecidir. Bu çalışmada bir kurumsal kaynak planlama yazılımına ait günlük hata loglarını toplayarak birtakım önişleme işlemleri gerçekleştirip, elde edilen veri üzerinde birliktelik analizi algoritması çalıştıran bir yazılım geliştirilmiştir. Bu yazılım sayesinde, bir hatanın oluşmasına yol açan olaylar arasındaki ilişkiler birliktelik analizi algoritması ile tespit edilerek, sonuçları yönetim kademesine e-posta ile raporlayan bir yapı kurulmuştur. Ayrıca hataya sebep olan sık örüntüler tespit edilmiş ve görselleştirilmiştir.

Developing a Data Mining Application using Software Bug Logs

Data mining is the process of posing queries and extracting patterns, often previously unknown from large quantities of data using pattern matching or other reasoning techniques. In this study, a software has been developed in order to perform some data preprocessing steps on the daily bug logs of an Enterprise Resource Planning software. The software also applies association rule mining algorithm on the collected data. It sends discovered associations by email to the corporate managers. Moreover, the frequent patterns which causes bug, has been detected and visualized

___

  • http:// en.wikipedia.org/wiki/Data_mining, (Erişim tarihi: Ocak 2014)‎.
  • Thuraisingham B., (2009) “Data Mining for Malicious Code Detection and Security Applications”, 2009. WI-IAT ‘09. IEEE/WIC/ACM International Joint Conferences on Web Intelligence and Intelligent Agent Technologies, ISBN : 978-0-7695-3801-3, Milan.
  • Bora S.P., (2011) “Data mining and ware housing”, 2011 3rd International Conference on Electronics Computer Technology (ICECT), ISBN: 978-1-4244- 8678-6, Kanyakumari.
  • Nagwani N. K., Bhansali A., (2010) “A Data Mining Model to Predict Software Bug Complexity Using Bug Estimation and Clustering”, 2010 International Conference on Recent Trends in Information, ISBN 13: 978-1-4244-5956-8, Kochi, Kerala.
  • Breckel A., (2012) “Error Mining: Bug Detection Through Comparison with Large Code Databases”, 9th IEEE Working Conference on Mining Software Repositories (MSR), ISBN : 978-1-4673-1760-3, Zürich.
  • Wijayasekara D., Manic, M., Wright, J.L., McQueen, M., (2012) “Mining Bug Databases for Unidentified Software Vulnerabilities”, 5th International Conference on Human System Interactions (HSI), ISBN : 978-1- 4673-4498-2, Perth, WA
  • Nagwani N. K., Verma S., (2012) “Predicting Expert Developers for Newly Reported Bugs Using Frequent Terms Similarities of Bug Attributes”, 2011 9th International Conference on ICT and Knowledge Engineering (ICT & Knowledge Engineering), ISBN : 978-1-4577-2161-8, Bangkok.
  • Gegick, M., Rotella, P., Tao Xie, (2010) “Identifying security bug reports via text mining: An industrial case study”, 7th IEEE Working Conference on Mining Software Repositories (MSR), ISBN: 978-1-4244- 6802-7, Cape Town
  • Lamkanfi, A., Perez, J., Demeyer, S., (2013) “The Eclipse and Mozilla defect tracking dataset: A genuine dataset for mining bug information”, 10th IEEE Working Conference on Mining Software Repositories (MSR), ISBN : 978-1-4799-0345-0, San Francisco, CA
  • Nagappan, M., Vouk, M.A., (2010) “Abstracting log lines to log event types for mining software system logs”, 7th IEEE Working Conference on Mining Software Repositories (MSR), ISBN : 978-1-4244- 6802-7, Cape Town
  • Lei-Yue Yao, Jian-Ying Xiong, (2009) “The research and implementation of a correlative degree mining algorithm based on IIS logs”, 2009, GRC ‘09. IEEE International Conference on Granular Computing, ISBN: 978-1-4244-4830-2, Nanchang [12] (Erişim tarihi: Ocak 2014).
  • Schneider A., Walter S., Langer J., Heinkel U., (2006) “Automatic Visualization of Abstract System Specifications”, QSIC 2006. Sixth International Conference on Quality Software, ISBN: 0-7695-2718- 3, Pekin