-
公开(公告)号:US10834103B2
公开(公告)日:2020-11-10
申请号:US15942530
申请日:2018-04-01
Applicant: Juniper Networks, Inc.
Inventor: Karthik Ragunath Balasundaram , Prakash T. Seshadri , Daniel J. Quinlan , Volodymyr Kuznetsov , Rakesh Kumar
Abstract: A security platform may determine mapped attribute information associated with a plurality of host identifiers. The mapped attribute information may include information that identifies a set of related attributes. The security platform may determine, based on the mapped attribute information, that a host device is associated with at least two host identifiers of the plurality of host identifiers. The security platform may aggregate, based on the at two least host identifiers, threat information as aggregated threat information associated with the host device. The security platform may classify the host device as an infected device or a suspicious device based on the aggregated threat information.
-
公开(公告)号:US20180288078A1
公开(公告)日:2018-10-04
申请号:US15942530
申请日:2018-04-01
Applicant: Juniper Networks, Inc.
Inventor: Karthik Ragunath Balasundaram , Prakash T. Seshadri , Daniel J. Quinlan , Volodymyr Kuznetsov , Rakesh Kumar
Abstract: A security platform may determine mapped attribute information associated with a plurality of host identifiers. The mapped attribute information may include information that identifies a set of related attributes. The security platform may determine, based on the mapped attribute information, that a host device is associated with at least two host identifiers of the plurality of host identifiers. The security platform may aggregate, based on the at two least host identifiers, threat information as aggregated threat information associated with the host device. The security platform may classify the host device as an infected device or a suspicious device based on the aggregated threat information.
-
公开(公告)号:US10834099B2
公开(公告)日:2020-11-10
申请号:US15602682
申请日:2017-05-23
Applicant: Juniper Networks, Inc.
Inventor: Yuly N. Becerra Tenorio , Wei Han Kao , Daniel J. Quinlan , Volodymyr Kuznetsov , Yuriy Voynalovych
Abstract: A security platform may determine, during receipt of a file, metadata associated with the file. The file may be intended for a client device. The security platform may compute, based on the metadata and during the receipt of the file, a hash associated with the file. The security platform may identify, during the receipt of the file, a stored hash that matches the hash associated with the file. The security platform may determine a security classification of the file based on information associated with a security classification corresponding to the stored hash. The security classification of the file may be determined before the receipt of the file is complete. The security platform may selectively permit, based on the security classification of the file, the client device to complete a receipt of the file.
-
-