首页> 外国专利> TRACKING HOST THREATS IN A NETWORK AND ENFORCING THREAT POLICY ACTIONS FOR THE HOST THREATS

TRACKING HOST THREATS IN A NETWORK AND ENFORCING THREAT POLICY ACTIONS FOR THE HOST THREATS

机译:跟踪网络中的主机威胁并针对主机威胁执行威胁策略操作

摘要

A device receives network segment information identifying network segments associated with a network, and receives endpoint host session information identifying sessions associated with endpoint hosts communicating with the network. The device generates, based on the network segment information and the endpoint host session information, a data structure that includes information associating the network segments with the sessions associated with the endpoint hosts. The device updates the data structure based on changes in the sessions associated with the endpoint hosts and based on changes in locations of the endpoint hosts within the network segments, and identifies, based on the data structure, a particular endpoint host, of the endpoint hosts, that changed locations within the network segments. The device determines a threat policy action to enforce for the particular endpoint host, and causes the threat policy action to be enforced, by the network, for the particular endpoint host.
机译:设备接收标识与网络关联的网络段的网段信息,并接收标识与与网络通信的端点主机相关的会话的端点主机会话信息。该设备基于网段信息和端点主机会话信息生成数据结构,该数据结构包括将网段与与端点主机相关联的会话相关联的信息。设备基于与端点主机关联的会话中的更改以及基于网段内端点主机位置的更改来更新数据结构,并基于该数据结构标识端点主机中的特定端点主机,从而更改了网段中的位置。设备确定要对特定终结点主机执行的威胁策略操作,并使网络对特定终结点主机执行威胁策略操作。

著录项

相似文献

  • 专利
  • 外文文献
  • 中文文献
获取专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号