{"id":"https://openalex.org/W4399418793","doi":"https://doi.org/10.1145/3651671.3651738","title":"Unlocking Deeper Understanding: Leveraging Explainable AI for API Anomaly Detection Insights","display_name":"Unlocking Deeper Understanding: Leveraging Explainable AI for API Anomaly Detection Insights","publication_year":2024,"publication_date":"2024-02-02","ids":{"openalex":"https://openalex.org/W4399418793","doi":"https://doi.org/10.1145/3651671.3651738"},"language":"en","primary_location":{"id":"doi:10.1145/3651671.3651738","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3651671.3651738","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 16th International Conference on Machine Learning and Computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101952826","display_name":"Mike Jones","orcid":"https://orcid.org/0009-0006-9653-5887"},"institutions":[{"id":"https://openalex.org/I103605065","display_name":"Berry College","ror":"https://ror.org/04btayy36","country_code":"US","type":"education","lineage":["https://openalex.org/I103605065"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Mike Jones","raw_affiliation_strings":["Berryhill High School, USA"],"raw_orcid":"https://orcid.org/0009-0006-9653-5887","affiliations":[{"raw_affiliation_string":"Berryhill High School, USA","institution_ids":["https://openalex.org/I103605065"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5093461017","display_name":"Masrufa Bayesh","orcid":"https://orcid.org/0009-0006-0755-9351"},"institutions":[{"id":"https://openalex.org/I115475287","display_name":"Oklahoma State University","ror":"https://ror.org/01g9vbr38","country_code":"US","type":"education","lineage":["https://openalex.org/I115475287"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Masrufa Bayesh","raw_affiliation_strings":["Department of Computer Science , Oklahoma State University, USA"],"raw_orcid":"https://orcid.org/0009-0006-0755-9351","affiliations":[{"raw_affiliation_string":"Department of Computer Science , Oklahoma State University, USA","institution_ids":["https://openalex.org/I115475287"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5000568854","display_name":"Sharmin Jahan","orcid":"https://orcid.org/0000-0003-1306-4591"},"institutions":[{"id":"https://openalex.org/I115475287","display_name":"Oklahoma State University","ror":"https://ror.org/01g9vbr38","country_code":"US","type":"education","lineage":["https://openalex.org/I115475287"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sharmin Jahan","raw_affiliation_strings":["Department of Computer Science , Oklahoma State University, USA"],"raw_orcid":"https://orcid.org/0000-0003-1306-4591","affiliations":[{"raw_affiliation_string":"Department of Computer Science , Oklahoma State University, USA","institution_ids":["https://openalex.org/I115475287"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5101952826"],"corresponding_institution_ids":["https://openalex.org/I103605065"],"apc_list":null,"apc_paid":null,"fwci":0.3364,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.56567412,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"211","last_page":"217"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9927999973297119,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9922000169754028,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7595639228820801},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.6367473602294922},{"id":"https://openalex.org/keywords/application-programming-interface","display_name":"Application programming interface","score":0.5135055184364319},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4970722496509552},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4644624590873718},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.4521995186805725},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4388112723827362},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4369845390319824},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.3535280227661133},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3308969736099243},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.17947563529014587}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7595639228820801},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.6367473602294922},{"id":"https://openalex.org/C99613125","wikidata":"https://www.wikidata.org/wiki/Q165194","display_name":"Application programming interface","level":2,"score":0.5135055184364319},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4970722496509552},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4644624590873718},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.4521995186805725},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4388112723827362},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4369845390319824},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.3535280227661133},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3308969736099243},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.17947563529014587},{"id":"https://openalex.org/C136264566","wikidata":"https://www.wikidata.org/wiki/Q159810","display_name":"Economy","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3651671.3651738","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3651671.3651738","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 16th International Conference on Machine Learning and Computing","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G6298236341","display_name":null,"funder_award_id":"2055557","funder_id":"https://openalex.org/F4320323817","funder_display_name":"Universitas Brawijaya"}],"funders":[{"id":"https://openalex.org/F4320323817","display_name":"Universitas Brawijaya","ror":"https://ror.org/01wk3d929"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W1574447377","https://openalex.org/W2340896621","https://openalex.org/W2906484232","https://openalex.org/W2945976633","https://openalex.org/W2950972206","https://openalex.org/W2963162645","https://openalex.org/W2975495759","https://openalex.org/W3104128335","https://openalex.org/W4286774849","https://openalex.org/W4307571902","https://openalex.org/W4386512177"],"related_works":["https://openalex.org/W2065457896","https://openalex.org/W3173234801","https://openalex.org/W2167984027","https://openalex.org/W2105642232","https://openalex.org/W3021302227","https://openalex.org/W10630519","https://openalex.org/W1919377569","https://openalex.org/W3144288563","https://openalex.org/W3197833032","https://openalex.org/W3123907821"],"abstract_inverted_index":{"In":[0],"the":[1,29,44,97,106,114,159,176,195,223,229,259,265,282],"modern":[2],"era":[3],"of":[4,18,83,100,108,117,139,179],"digitalization":[5],"and":[6,21,36,54,67,77,111,113,141,157,181,216,232,252,274,276],"interconnected":[7],"systems,":[8],"Application":[9],"Programming":[10],"Interfaces":[11],"(APIs)":[12],"have":[13,226,242,279],"become":[14],"a":[15,61,128,190,200,244,254],"crucial":[16,173],"aspect":[17],"data":[19,50,75,101,140],"exchange":[20],"communication":[22],"between":[23],"various":[24],"software":[25],"applications.":[26],"However,":[27,91,164,209],"with":[28],"benefits,":[30],"APIs":[31,71,104],"introduce":[32],"new":[33],"security":[34,59,79],"threats":[35],"attack":[37],"vectors":[38],"due":[39,95,131],"to":[40,43,49,69,88,96,132,135,143,152,165,174,228,281,285],"their":[41],"exposure":[42],"internet,":[45],"making":[46],"them":[47],"susceptible":[48],"breaches,":[51,76],"service":[52,221],"disruptions,":[53],"financial":[55],"losses.":[56],"Therefore,":[57],"API":[58,84,118,148,155,202,269],"becomes":[60],"primary":[62],"concern":[63],"that":[64,193,246,257,264],"necessitates":[65],"measures":[66,184],"practices":[68],"protect":[70,166],"from":[72,168,212,249],"unauthorized":[73],"access,":[74],"other":[78],"threats.":[80],"Continuous":[81],"monitoring":[82,268],"behaviors":[85,156,270],"is":[86,93,172,189,205,271],"necessary":[87,283],"detect":[89],"anomalies.":[90],"it":[92,171],"challenging":[94],"massive":[98],"volumes":[99],"generated":[102],"by":[103],"in":[105,222],"form":[107],"logs,":[109],"metrics,":[110],"traces":[112],"evolving":[115],"nature":[116],"behaviors.":[119],"To":[120,237],"address":[121,238],"this":[122,239],"challenge,":[123],"machine":[124],"learning":[125],"(ML)":[126],"offers":[127],"promising":[129],"solution":[130,192],"its":[133],"ability":[134],"process":[136,266],"vast":[137],"amounts":[138],"adapt":[142],"dynamic":[144],"environments.":[145],"We":[146],"investigate":[147],"access":[149,227,280],"behavior":[150],"patterns":[151],"predict":[153],"anomalous":[154],"employ":[158],"random":[160],"forest":[161],"(RF)":[162],"model.":[163],"applications":[167],"being":[169],"compromised,":[170],"understand":[175],"underlying":[177],"causes":[178],"anomalies":[180],"enable":[182],"protection":[183],"accordingly.":[185],"Explainable":[186],"AI":[187],"(XAI)":[188],"prominent":[191],"explains":[194],"model's":[196],"decision":[197],"for":[198,235,267],"why":[199],"particular":[201],"usage":[203],"pattern":[204],"considered":[206],"an":[207],"anomaly.":[208],"gaining":[210],"insight":[211],"explanations":[213],"requires":[214],"expertise,":[215],"not":[217],"every":[218],"stakeholder":[219],"or":[220],"application":[224],"may":[225],"deployed":[230],"ML":[231],"XAI":[233,250,260],"used":[234],"monitoring.":[236],"issue,":[240],"we":[241],"developed":[243],"component":[245],"extracts":[247],"information":[248,284],"outcomes":[251],"generates":[253],"structured":[255],"report":[256],"reflects":[258],"outcomes.":[261],"This":[262],"ensures":[263],"transparent,":[272],"interpretable,":[273],"trustworthy,":[275],"all":[277],"stakeholders":[278],"make":[286],"informed":[287],"decisions.":[288]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
