Juniper Networks, Inc.
Tracking and mitigation of an infected host device

Last updated:

Abstract:

A security platform may determine mapped attribute information associated with a plurality of host identifiers. The mapped attribute information may include information that identifies a set of related attributes. The security platform may determine, based on the mapped attribute information, that a host device is associated with at least two host identifiers of the plurality of host identifiers. The security platform may aggregate, based on the at two least host identifiers, threat information as aggregated threat information associated with the host device. The security platform may classify the host device as an infected device or a suspicious device based on the aggregated threat information.

Status:
Grant
Type:

Utility

Filling date:

1 Apr 2018

Issue date:

10 Nov 2020