| CPC G06F 21/565 (2013.01) [G06F 21/562 (2013.01); G06F 21/563 (2013.01); G06N 3/084 (2013.01); G06N 5/04 (2013.01); G06N 20/00 (2019.01)] | 20 Claims |

|
1. A method, comprising:
receiving a potentially malicious file;
splitting data of the potentially malicious file into a first set of fragments, each fragment from the first set of fragments having a same first size;
splitting the data of the potentially malicious file into a second set of fragments, each fragment from the second set of fragments having a same second size different than the first size;
providing the first set of fragments to a machine learning model to identify a first fragment, the first fragment being from the first set of fragments and including information potentially relevant to a determination of whether the potentially malicious file is malicious;
providing the second set of fragments to the machine learning model to identify a second fragment, the second fragment being from the second set of fragments and including information potentially relevant to a determination of whether the potentially malicious file is malicious; and
determining, based on a combination of the first fragment and the second fragment identified by the machine learning model, that the potentially malicious file is malicious.
|