US 11,888,877 B2
Tracking host threats in a network and enforcing threat policy actions for the host threats
Prakash T. Seshadri, Fremont, CA (US); Binh Phu Le, San Jose, CA (US); Srinivas Nimmagadda, San Jose, CA (US); Jeffrey S. Marshall, Santa Clara, CA (US); and Kartik Krishnan S. Iyyer, San Jose, CA (US)
Assigned to Juniper Networks, Inc., Sunnyvale, CA (US)
Filed by Juniper Networks, Inc., Sunnyvale, CA (US)
Filed on Nov. 18, 2020, as Appl. No. 16/949,865.
Application 16/949,865 is a continuation of application No. 16/024,319, filed on Jun. 29, 2018, granted, now 10,862,912.
Claims priority of provisional application 62/647,431, filed on Mar. 23, 2018.
Claims priority of provisional application 62/647,460, filed on Mar. 23, 2018.
Prior Publication US 2021/0075810 A1, Mar. 11, 2021
Int. Cl. H04L 9/40 (2022.01); G06F 16/23 (2019.01); G06F 16/22 (2019.01); H04L 67/52 (2022.01)
CPC H04L 63/1425 (2013.01) [G06F 16/2228 (2019.01); G06F 16/2379 (2019.01); H04L 63/0209 (2013.01); H04L 63/1416 (2013.01); H04L 63/1433 (2013.01); H04L 63/1441 (2013.01); H04L 63/20 (2013.01); H04L 67/52 (2022.05)] 20 Claims
OG exemplary drawing
 
1. A method, comprising:
generating, by a device, a data structure of endpoint hosts that are each connected to a network and at least one network segment, of a plurality of network segments, of the network;
updating, by the device, the data structure based on a change in a state of a session associated with at least one endpoint host, of the endpoint hosts;
identifying, by the device and based on the data structure, a particular endpoint host, of the endpoint hosts, that changed location within the at least one network segment;
automatically determining, by the device, an action to enforce for the particular endpoint host that is triggered by the changed location within the at least one network segment;
identifying, by the device, a network control system that controls the at least one network segment associated with the particular endpoint host; and
causing, by the device, the action to be enforced, by the network control system, for the particular endpoint host.