US 12,261,870 B2
Tracking host threats in a network and enforcing threat policy actions for the host threats
Prakash T. Seshadri, Fremont, CA (US); Binh Phu Le, San Jose, CA (US); Srinivas Nimmagadda, San Jose, CA (US); Jeffrey S. Marshall, Santa Clara, CA (US); and Kartik Krishnan S. Iyyer, San Jose, CA (US)
Assigned to Juniper Networks, Inc., Sunnyvale, CA (US)
Filed by Juniper Networks, Inc., Sunnyvale, CA (US)
Filed on Dec. 5, 2023, as Appl. No. 18/529,413.
Application 18/529,413 is a continuation of application No. 16/949,865, filed on Nov. 18, 2020, granted, now 11,888,877.
Application 16/949,865 is a continuation of application No. 16/024,319, filed on Jun. 29, 2018, granted, now 10,862,912, issued on Dec. 8, 2020.
Claims priority of provisional application 62/647,431, filed on Mar. 23, 2018.
Claims priority of provisional application 62/647,460, filed on Mar. 23, 2018.
Prior Publication US 2024/0106849 A1, Mar. 28, 2024
Int. Cl. H04L 9/40 (2022.01); G06F 16/22 (2019.01); G06F 16/23 (2019.01); H04L 67/52 (2022.01)
CPC H04L 63/1425 (2013.01) [G06F 16/2228 (2019.01); G06F 16/2379 (2019.01); H04L 63/0209 (2013.01); H04L 63/1416 (2013.01); H04L 63/1433 (2013.01); H04L 63/1441 (2013.01); H04L 63/20 (2013.01); H04L 67/52 (2022.05)] 20 Claims
OG exemplary drawing
 
1. A device, comprising:
one or more memories; and
one or more processors to:
generate a data structure identifying endpoint hosts that are connected to a network and identifying a network segment of the network;
identify, based on the data structure, an endpoint host, of the endpoint hosts, that changed location within the network segment;
automatically determine an action to enforce for the endpoint host when the endpoint host is triggered by the changed location within the network segment; and
cause the action to be enforced for the endpoint host.