TRACKING HOST THREATS IN A NETWORK AND ENFORCING THREAT POLICY ACTIONS FOR THE HOST THREATS

    公开(公告)号:US20190297103A1

    公开(公告)日:2019-09-26

    申请号:US16024319

    申请日:2018-06-29

    Abstract: A device receives network segment information identifying network segments associated with a network, and receives endpoint host session information identifying sessions associated with endpoint hosts communicating with the network. The device generates, based on the network segment information and the endpoint host session information, a data structure that includes information associating the network segments with the sessions associated with the endpoint hosts. The device updates the data structure based on changes in the sessions associated with the endpoint hosts and based on changes in locations of the endpoint hosts within the network segments, and identifies, based on the data structure, a particular endpoint host, of the endpoint hosts, that changed locations within the network segments. The device determines a threat policy action to enforce for the particular endpoint host, and causes the threat policy action to be enforced, by the network, for the particular endpoint host.

    ENFORCING THREAT POLICY ACTIONS BASED ON NETWORK ADDRESSES OF HOST THREATS

    公开(公告)号:US20210099472A1

    公开(公告)日:2021-04-01

    申请号:US17247461

    申请日:2020-12-11

    Abstract: A device receives information identifying a specific host threat to a network, where the information includes a list of network addresses associated with the specific host threat. The device identifies network elements, of the network, associated with the specific host threat to the network, and determines a network control system associated with the identified network elements. The device determines a policy enforcement group of network elements, of the identified network elements, that maps to the list of network addresses associated with the specific host threat, where the network control system is associated with the policy enforcement group of network elements. The device determines a threat policy action to enforce for the specific host threat, and causes, via the network control system, the threat policy action to be enforced by the policy enforcement group of network elements.

Patent Agency Ranking