Share This Article:

Features of Virus Detection Mechanism in Microsoft Security Essentials (Microsoft Forefront Endpoint Protection)

Abstract Full-Text HTML XML Download Download as PDF (Size:38KB) PP. 124-127
DOI: 10.4236/jis.2013.42014    4,335 Downloads   7,284 Views  
Author(s)    Leave a comment

ABSTRACT

In this paper, a signature-based selective mechanism in detecting virus signatures in executable files was found and investigated. A pattern under which the Microsoft Security Essentials antivirus software not detecting a virus signature deliberately placed in files was revealed.

Conflicts of Interest

The authors declare no conflicts of interest.

Cite this paper

D. Silnov, "Features of Virus Detection Mechanism in Microsoft Security Essentials (Microsoft Forefront Endpoint Protection)," Journal of Information Security, Vol. 4 No. 2, 2013, pp. 124-127. doi: 10.4236/jis.2013.42014.

References

[1] D. S. Silnov, “Problems of Antivirus False Positives,” Applied Informatics, 2012, pp. 63-66.
[2] Microsoft Security Essentials—Free Antivirus Software. http://windows.microsoft. com/ru-RU/win dows/products/security- essentials
[3] Microsoft Forefront Endpoint Protection, Antivirus Protection against Malware. http://www.microsoft. com/ru-ru/server-cloud/fore front/ endpoint-protection.aspx
[4] Introduction to Code Signing. http://msdn.microso ft.com/en-us/library/ms5373 61%28v=vs. 85%29.aspx
[5] WinHEX. http://www.winhex.com/winhex/
[6] Fake Anti-Virus Software and Related Threats, Microsoft Security Center. http://www.microsoft. com/ru-ru/security/pc-security/ antivirus-rogue.aspx
[7] Bitdefender Antivirus Software. http://www.bitdefender.ru/
[8] The Stuxnet Sting. http://blogs.technet.com/b/mmpc/archive/2010/07/16/the-stuxnet-sting.aspx

  
comments powered by Disqus

Copyright © 2020 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.