
detection, where all tests are considered at the same
time. Either a complementary model can be applied
that deals with inter-variable dependencies or general
algorithms that inherently model these dependencies
can be integrated. In upcoming work, the injection of
memory leaks into the system which is undergoing the
testing procedures would be an interesting study case.
By including more data from real-world projects, bet-
ter thresholds for the decision making may be derived.
This further strengthens the usage of anomaly detec-
tion in CI pipelines.
REFERENCES
Atzberger., D., Cech., T., Scheibel., W., Richter., R., and
D
¨
ollner., J. (2023). Detecting outliers in ci/cd pipeline
logs using latent dirichlet allocation. In Proceedings
of the 18th International Conference on Evaluation of
Novel Approaches to Software Engineering - ENASE,
pages 461–468. INSTICC, SciTePress.
Bourlard, H. and Kamp, Y. (1988). Auto-association by
multilayer perceptrons and singular value decomposi-
tion. Biological cybernetics, 59(4-5):291–294.
BSH Group (2022). Bosch Siemens Home Appliances
(BSH). https://www.bsh-group.com/.
Capizzi, A., Distefano, S., Ara
´
ujo, L. J., Mazzara, M., Ah-
mad, M., and Bobrov, E. (2020). Anomaly detection
in devops toolchain. In Workshop on Software Engi-
neering Aspects of Continuous Development and New
Paradigms of Software Production and Deployment,
pages 37–51. Springer.
Cherkasova, L., Ozonat, K., Mi, N., Symons, J., and Smirni,
E. (2009). Automated anomaly detection and per-
formance modeling of enterprise applications. ACM
TOCS, 27(3):1–32.
Conover, W. (1971). Practical nonparametric statistics.. new
york: Wiley & sons.
Dem
ˇ
sar, J. (2006). Statistical comparisons of classifiers
over multiple data sets. The Journal of Machine learn-
ing research, 7:1–30.
El Amine Sehili, M. and Zhang, Z. (2023). Multivariate
time series anomaly detection: Fancy algorithms and
flawed evaluation methodology. arXiv e-prints.
Fowler, M. (2006). Continuous integration. https:
//martinfowler.com/articles/continuousIntegration.
html.
Garg, A., Zhang, W., Samaran, J., Savitha, R., and Foo, C.-
S. (2021). An evaluation of anomaly detection and
diagnosis in multivariate time series. IEEE Trans-
actions on Neural Networks and Learning Systems,
33(6):2508–2517.
Grigorakis, A. (1997). Application of detection theory to
the measurement of the minimum detectable signal for
a sinusoid in gaussian noise displayed on a lofargram.
Technical report, Citeseer.
Hany Fawzy, A., Wassif, K., and Moussa, H. (2023).
Framework for automatic detection of anomalies in
devops. Journal of King Saud University - Computer
and Information Sciences, 35(3):8–19.
Hrusto, A., Engstr
¨
om, E., and Runeson, P. (2022). Opti-
mization of anomaly detection in a microservice sys-
tem through continuous feedback from development.
In Proceedings of the 10th IEEE/ACM International
Workshop on Software Engineering for Systems-of-
Systems and Software Ecosystems, pages 13–20.
Huck, S. W., Cross, T. L., and Clark, S. B. (1986). Over-
coming misconceptions about z-scores. Teaching
Statistics, 8(2):38–40.
Jorgensen, P. C. (2013). Software testing: a craftsman’s
approach (Fourth Edition). Auerbach Publications.
Jung, C., Lee, S., Raman, E., and Pande, S. (2014). Auto-
mated memory leak detection for production use. In
Proceedings of the 36th International Conference on
Software Engineering, pages 825–836.
Kawaguchi, K. (2011). Jenkins (Software). https://www.
jenkins.io/, accessed on 2023-08-24.
Liu, F. T., Ting, K. M., and Zhou, Z.-H. (2008). Isolation
forest. In 2008 Eighth IEEE International Conference
on Data Mining, pages 413–422.
Provotar, O. I., Linder, Y. M., and Veres, M. M. (2019).
Unsupervised anomaly detection in time series using
lstm-based autoencoders. In 2019 IEEE International
Conference on Advanced Trends in Information The-
ory (ATIT), pages 513–517. IEEE.
Red Hat, Inc. (2022). What is a ci/cd pipeline? https://www.
redhat.com/en/topics/devops/what-cicd-pipeline, ac-
cessed on 2023-12-29.
Sakurada, M. and Yairi, T. (2014). Anomaly detection
using autoencoders with nonlinear dimensionality re-
duction. In Proceedings of the MLSDA 2014, page
4–11. Association for Computing Machinery.
Schmidl, S., Wenig, P., and Papenbrock, T. (2022).
Anomaly detection in time series: a comprehensive
evaluation. Proceedings of the VLDB Endowment,
15(9):1779–1797.
Strandberg, P. E., Afzal, W., and Sundmark, D. (2022).
Software test results exploration and visualization
with continuous integration and nightly testing. In-
ternational Journal on Software Tools for Technology
Transfer, 24(2):261–285.
Tao, X., Peng, Y., Zhao, F., Zhao, P., and Wang, Y.
(2018). A parallel algorithm for network traffic
anomaly detection based on isolation forest. In-
ternational Journal of Distributed Sensor Networks,
14(11):1550147718814471.
Torabi, H., Mirtaheri, S. L., and Greco, S. (2023). Practical
autoencoder based anomaly detection by using vector
reconstruction error. Cybersecurity, 6(1):1.
Wu, R. and Keogh, E. (2021). Current time series anomaly
detection benchmarks are flawed and are creating the
illusion of progress. IEEE Transactions on Knowledge
and Data Engineering.
Yang, Z., Li, H., Yang, X., Peng, H., Shi, J., Peng, M.,
Wang, H., and Bai, H. (2023). User log anomaly de-
tection system based on isolation forest. In 2nd Inter-
national Joint Conference on Information and Com-
munication Engineering (JCICE), pages 79–84.
Unsupervised Anomaly Detection in Continuous Integration Pipelines
343