The model is also regularly updated from Hillstone Cloud . This process is illustrated in the following diagram
When a suspected malware is detected, the packet is further inspected and relevant features are extracted and processed through the model. It is given a predicted result with a specific confidence level and is also delivered with forensic evidence, threat intelligence, as well as a proposed action, shown in the threat details pages in the iCenter.