{"id":"https://openalex.org/W2167919179","doi":"https://doi.org/10.1109/.2006.1629452","title":"Portal Monitoring Based Anti-Malware Framework: Design and Implementation","display_name":"Portal Monitoring Based Anti-Malware Framework: Design and Implementation","publication_year":2006,"publication_date":"2006-05-25","ids":{"openalex":"https://openalex.org/W2167919179","doi":"https://doi.org/10.1109/.2006.1629452","mag":"2167919179"},"language":"en","primary_location":{"id":"doi:10.1109/.2006.1629452","is_oa":false,"landing_page_url":"https://doi.org/10.1109/.2006.1629452","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2006 IEEE International Performance Computing and Communications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101053493","display_name":"Yanjun Wu","orcid":"https://orcid.org/0000-0002-1823-0459"},"institutions":[{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yanjun Wu","raw_affiliation_strings":["Institute of Software, Graduate School of CAS, Chinese Academy and Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Software, Graduate School of CAS, Chinese Academy and Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210128818"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5017405627","display_name":"Wenchang Shi","orcid":"https://orcid.org/0000-0002-5160-1223"},"institutions":[{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenchang Shi","raw_affiliation_strings":["Institute of Software, Chinese Academy and Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Software, Chinese Academy and Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210128818"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5101053493"],"corresponding_institution_ids":["https://openalex.org/I4210128818"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.21502726,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"553","last_page":"558"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9757999777793884,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8578298687934875},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8316296935081482},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.6128193736076355},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5533518195152283},{"id":"https://openalex.org/keywords/malware-analysis","display_name":"Malware analysis","score":0.5320594906806946},{"id":"https://openalex.org/keywords/linux-kernel","display_name":"Linux kernel","score":0.49475544691085815},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.48726287484169006},{"id":"https://openalex.org/keywords/file-system","display_name":"File system","score":0.4700911045074463},{"id":"https://openalex.org/keywords/kernel","display_name":"Kernel (algebra)","score":0.42326223850250244},{"id":"https://openalex.org/keywords/intrusion","display_name":"Intrusion","score":0.4116579592227936},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.37701213359832764}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8578298687934875},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8316296935081482},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.6128193736076355},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5533518195152283},{"id":"https://openalex.org/C2779395397","wikidata":"https://www.wikidata.org/wiki/Q15731404","display_name":"Malware analysis","level":3,"score":0.5320594906806946},{"id":"https://openalex.org/C553261973","wikidata":"https://www.wikidata.org/wiki/Q14579","display_name":"Linux kernel","level":2,"score":0.49475544691085815},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.48726287484169006},{"id":"https://openalex.org/C2780940931","wikidata":"https://www.wikidata.org/wiki/Q174989","display_name":"File system","level":2,"score":0.4700911045074463},{"id":"https://openalex.org/C74193536","wikidata":"https://www.wikidata.org/wiki/Q574844","display_name":"Kernel (algebra)","level":2,"score":0.42326223850250244},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.4116579592227936},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.37701213359832764},{"id":"https://openalex.org/C17409809","wikidata":"https://www.wikidata.org/wiki/Q161764","display_name":"Geochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/.2006.1629452","is_oa":false,"landing_page_url":"https://doi.org/10.1109/.2006.1629452","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2006 IEEE International Performance Computing and Communications Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.6499999761581421}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":3,"referenced_works":["https://openalex.org/W2115348994","https://openalex.org/W2150858564","https://openalex.org/W2156479376"],"related_works":["https://openalex.org/W2768892939","https://openalex.org/W2469507153","https://openalex.org/W2008790809","https://openalex.org/W2134874482","https://openalex.org/W4285507391","https://openalex.org/W2397240470","https://openalex.org/W2602767565","https://openalex.org/W170652726","https://openalex.org/W2883822334","https://openalex.org/W3164408430"],"abstract_inverted_index":{"Most":[0],"malware":[1],"are":[2,20,94,109],"introduced":[3],"into":[4],"a":[5,61,65,72],"computer":[6],"system":[7,24],"by":[8,35,53],"applications":[9,17,56],"that":[10],"communicate":[11],"with":[12,60,67,131],"the":[13,37,44,54,86,106,125],"outside":[14],"world.":[15],"These":[16],"(called":[18],"portals)":[19],"key":[21],"components":[22],"for":[23,116],"security.":[25],"This":[26],"paper":[27],"presents":[28],"an":[29],"efficient":[30],"anti-malware":[31],"framework":[32,126],"under":[33,122],"Linux":[34,123],"monitoring":[36],"behavior":[38],"of":[39],"these":[40],"portals":[41],"and":[42,91,101],"isolating":[43],"files":[45,49],"they":[46],"induced.":[47],"The":[48,88],"created":[50],"or":[51,76],"modified":[52],"monitored":[55],"will":[57,81],"be":[58,82],"marked":[59],"suspicious":[62,68],"label;":[63],"when":[64],"file":[66,89],"label":[69],"is":[70,99],"accessed,":[71],"predefined":[73],"scanning":[74,107],"tool":[75],"other":[77],"mechanisms":[78,108],"in":[79,96,111],"user-land":[80],"invoked":[83],"to":[84,103,118],"check":[85],"file.":[87],"labeling":[90],"access":[92],"mediation":[93],"done":[95],"kernel,":[97],"thus":[98,114],"mandatory":[100],"transparent":[102],"user":[104,112,117],"applications;":[105],"implemented":[110],"land,":[113],"flexible":[115],"customize.":[119],"Experiment":[120],"result":[121],"shows":[124],"can":[127],"prevent":[128],"malware's":[129],"intrusion":[130],"small":[132],"performance":[133],"penalty.":[134]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
