{"id":"https://openalex.org/W2808997185","doi":"https://doi.org/10.1109/iccnc.2018.8390376","title":"A Secure Container-based Backup Mechanism to Survive Destructive Ransomware Attacks","display_name":"A Secure Container-based Backup Mechanism to Survive Destructive Ransomware Attacks","publication_year":2018,"publication_date":"2018-03-01","ids":{"openalex":"https://openalex.org/W2808997185","doi":"https://doi.org/10.1109/iccnc.2018.8390376","mag":"2808997185"},"language":"en","primary_location":{"id":"doi:10.1109/iccnc.2018.8390376","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccnc.2018.8390376","pdf_url":null,"source":{"id":"https://openalex.org/S4306498346","display_name":"2018 International Conference on Computing, Networking and Communications (ICNC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 International Conference on Computing, Networking and Communications (ICNC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101656959","display_name":"Yong Jin","orcid":"https://orcid.org/0000-0003-2967-5557"},"institutions":[{"id":"https://openalex.org/I114531698","display_name":"Tokyo Institute of Technology","ror":"https://ror.org/0112mx960","country_code":"JP","type":"education","lineage":["https://openalex.org/I114531698"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Yong Jin","raw_affiliation_strings":["Tokyo Institute of Technology, 2-12-1 O-okayama, Meguroku, Tokyo, JAPAN"],"affiliations":[{"raw_affiliation_string":"Tokyo Institute of Technology, 2-12-1 O-okayama, Meguroku, Tokyo, JAPAN","institution_ids":["https://openalex.org/I114531698"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054448019","display_name":"Masahiko Tomoishi","orcid":"https://orcid.org/0000-0001-5636-7774"},"institutions":[{"id":"https://openalex.org/I114531698","display_name":"Tokyo Institute of Technology","ror":"https://ror.org/0112mx960","country_code":"JP","type":"education","lineage":["https://openalex.org/I114531698"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Masahiko Tomoishi","raw_affiliation_strings":["Tokyo Institute of Technology, 2-12-1 O-okayama, Meguroku, Tokyo, JAPAN"],"affiliations":[{"raw_affiliation_string":"Tokyo Institute of Technology, 2-12-1 O-okayama, Meguroku, Tokyo, JAPAN","institution_ids":["https://openalex.org/I114531698"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102259109","display_name":"Satoshi Matsuura","orcid":null},"institutions":[{"id":"https://openalex.org/I114531698","display_name":"Tokyo Institute of Technology","ror":"https://ror.org/0112mx960","country_code":"JP","type":"education","lineage":["https://openalex.org/I114531698"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Satoshi Matsuura","raw_affiliation_strings":["Tokyo Institute of Technology, 2-12-1 O-okayama, Meguroku, Tokyo, JAPAN"],"affiliations":[{"raw_affiliation_string":"Tokyo Institute of Technology, 2-12-1 O-okayama, Meguroku, Tokyo, JAPAN","institution_ids":["https://openalex.org/I114531698"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5086969205","display_name":"Yoshiaki Kitaguchi","orcid":"https://orcid.org/0000-0002-8387-4365"},"institutions":[{"id":"https://openalex.org/I114531698","display_name":"Tokyo Institute of Technology","ror":"https://ror.org/0112mx960","country_code":"JP","type":"education","lineage":["https://openalex.org/I114531698"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Yoshiaki Kitaguchi","raw_affiliation_strings":["Tokyo Institute of Technology, 2-12-1 O-okayama, Meguroku, Tokyo, JAPAN"],"affiliations":[{"raw_affiliation_string":"Tokyo Institute of Technology, 2-12-1 O-okayama, Meguroku, Tokyo, JAPAN","institution_ids":["https://openalex.org/I114531698"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5101656959"],"corresponding_institution_ids":["https://openalex.org/I114531698"],"apc_list":null,"apc_paid":null,"fwci":1.6103,"has_fulltext":false,"cited_by_count":13,"citation_normalized_percentile":{"value":0.85396825,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/backup","display_name":"Backup","score":0.9640465974807739},{"id":"https://openalex.org/keywords/backup-software","display_name":"Backup software","score":0.7132381200790405},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6931273937225342},{"id":"https://openalex.org/keywords/container","display_name":"Container (type theory)","score":0.5689884424209595},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5687613487243652},{"id":"https://openalex.org/keywords/ransomware","display_name":"Ransomware","score":0.5288934111595154},{"id":"https://openalex.org/keywords/firewall","display_name":"Firewall (physics)","score":0.5082728266716003},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.457484632730484},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.41699787974357605},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.19621464610099792},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.11799740791320801}],"concepts":[{"id":"https://openalex.org/C2780945871","wikidata":"https://www.wikidata.org/wiki/Q194274","display_name":"Backup","level":2,"score":0.9640465974807739},{"id":"https://openalex.org/C503016453","wikidata":"https://www.wikidata.org/wiki/Q4839801","display_name":"Backup software","level":3,"score":0.7132381200790405},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6931273937225342},{"id":"https://openalex.org/C2781018962","wikidata":"https://www.wikidata.org/wiki/Q5164884","display_name":"Container (type theory)","level":2,"score":0.5689884424209595},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5687613487243652},{"id":"https://openalex.org/C2777667771","wikidata":"https://www.wikidata.org/wiki/Q926331","display_name":"Ransomware","level":3,"score":0.5288934111595154},{"id":"https://openalex.org/C77714075","wikidata":"https://www.wikidata.org/wiki/Q5452017","display_name":"Firewall (physics)","level":5,"score":0.5082728266716003},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.457484632730484},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.41699787974357605},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.19621464610099792},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.11799740791320801},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C74650414","wikidata":"https://www.wikidata.org/wiki/Q11397","display_name":"Classical mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C124017977","wikidata":"https://www.wikidata.org/wiki/Q11412","display_name":"Gravitation","level":2,"score":0.0},{"id":"https://openalex.org/C115304011","wikidata":"https://www.wikidata.org/wiki/Q72755","display_name":"Schwarzschild radius","level":3,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C183915046","wikidata":"https://www.wikidata.org/wiki/Q1316152","display_name":"Charged black hole","level":4,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iccnc.2018.8390376","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccnc.2018.8390376","pdf_url":null,"source":{"id":"https://openalex.org/S4306498346","display_name":"2018 International Conference on Computing, Networking and Communications (ICNC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 International Conference on Computing, Networking and Communications (ICNC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W1503499126","https://openalex.org/W1868801145","https://openalex.org/W2050529356","https://openalex.org/W2487301225","https://openalex.org/W2511701350","https://openalex.org/W2513529237","https://openalex.org/W2542711305","https://openalex.org/W4298474198"],"related_works":["https://openalex.org/W2939925694","https://openalex.org/W2354454611","https://openalex.org/W2829881200","https://openalex.org/W2912157285","https://openalex.org/W2363714705","https://openalex.org/W2348996366","https://openalex.org/W2138485806","https://openalex.org/W2367727984","https://openalex.org/W2372983632","https://openalex.org/W2361614996"],"abstract_inverted_index":{"The":[0],"threats":[1],"of":[2],"destructive":[3,39],"ransomware":[4,40],"keep":[5],"increasing":[6],"and":[7,14,57,65,72,87,117,126,146,156],"current":[8],"security":[9],"facilities":[10],"(firewall,":[11],"IDS/IPS,":[12],"etc.)":[13],"backup":[15,35,46,66,95,111,151,159],"systems":[16],"cannot":[17,108],"effectively":[18],"protect":[19],"data":[20,67,86,112,133,152,160],"from":[21,137],"the":[22,43,45,59,70,77,84,88,106,110,115,118,124,127,132,138,158],"attacks":[23],"in":[24,50,69,105,114],"real":[25],"time.":[26],"In":[27,42],"this":[28],"paper,":[29],"we":[30],"propose":[31],"a":[32,51,143],"secure":[33],"container-based":[34],"mechanism":[36],"to":[37,82,93],"survive":[38],"attacks.":[41],"mechanism,":[44],"process":[47,96],"takes":[48],"place":[49],"highly":[52],"restricted":[53],"local":[54,71],"docker":[55],"container":[56,60,89,116,128],"only":[58,80,91],"can":[61,134,150],"access":[62,83,109],"both":[63],"source":[64,85],"stored":[68,113],"remote":[73,119,139],"storages.":[74],"That":[75],"is,":[76],"host":[78,107,125],"is":[79,90],"allowed":[81,92],"perform":[94],"without":[97],"any":[98,102],"other":[99,103],"communications.":[100],"Consequently,":[101],"processes":[104],"storage.":[120,140],"Thus":[121],"even":[122],"if":[123],"are":[129],"completely":[130],"destroyed,":[131],"be":[135],"recovered":[136],"We":[141],"implemented":[142],"prototype":[144],"system":[145],"confirmed":[147],"that":[148],"it":[149],"with":[153],"high":[154],"usability":[155],"store":[157],"securely.":[161]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
