- Irvine CA, US Matthew Wolff - Laguna Niguel CA, US John Brock - Irvine CA, US Brian Michael Wallace - Irvine CA, US Andy Wortman - Irvine CA, US Jian Luan - Irvine CA, US Mahdi Azarafrooz - Irvine CA, US Andrew Davis - Portland OR, US Michael Thomas Wojnowicz - Irvine CA, US Derek A. Soeder - Irvine CA, US David N. Beveridge - Portland OR, US Yaroslav Oliinyk - Portland OR, US Ryan Permeh - Laguna Hills CA, US
A system is provided for training a machine learning model to detect malicious container files. The system may include at least one processor and at least one memory. The memory may include program code which when executed by the at least one processor provides operations including: processing a container file with a trained machine learning model, wherein the trained machine learning is trained to determine a classification for the container file indicative of whether the container file includes at least one file rendering the container file malicious; and providing, as an output by the trained machine learning model, an indication of whether the container file includes the at least one file rendering the container file malicious. Related methods and articles of manufacture, including computer program products, are also disclosed.
Training A Machine Learning Model For Container File Analysis
- Irvine CA, US Matthew Wolff - Laguna Niguel CA, US John Brock - Irvine CA, US Brian Wallace - Irvine CA, US Andy Wortman - Irvine CA, US Jian Luan - Irvine CA, US Mahdi Azarafrooz - Irvine CA, US Andrew Davis - Portland OR, US Michael Wojnowicz - Irvine CA, US Derek Soeder - Irvine CA, US David Beveridge - Portland OR, US Yaroslav Oliinyk - Portland OR, US Ryan Permeh - Laguna Hills CA, US
International Classification:
G06F 21/56 G06F 21/50 G06N 3/04
Abstract:
In one respect, there is provided a system for training a machine learning model to detect malicious container files. The system may include at least one processor and at least one memory. The at least one memory may include program code that provides operations when executed by the at least one processor. The operations may include: training, based on a training data, a machine learning model to enable the machine learning model to determine whether at least one container file includes at least one file rendering the at least one container file malicious; and providing the trained machine learning model to enable the determination of whether the at least one container file includes at least one file rendering the at least one container file malicious. Related methods and articles of manufacture, including computer program products, are also disclosed.