The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Nov. 07, 2023

Filed:

Mar. 20, 2020
Applicant:

Juniper Networks, Inc., Sunnyvale, CA (US);

Inventors:

Shraddha Hegde, Bangalore, IN;

Antoni B Przygienda, Sunnyvale, CA (US);

Salih K A, Bangalore, IN;

Harsha Lakshmikanth, Bangalore, IN;

Assignee:

Juniper Networks, Inc., Sunnyvale, CA (US);

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
G06F 15/173 (2006.01); H04L 45/02 (2022.01); H04L 41/12 (2022.01); H04L 45/00 (2022.01); H04L 45/28 (2022.01); H04L 9/40 (2022.01);
U.S. Cl.
CPC ...
H04L 45/02 (2013.01); H04L 41/12 (2013.01); H04L 45/04 (2013.01); H04L 45/22 (2013.01); H04L 45/28 (2013.01); H04L 45/32 (2013.01); H04L 63/1408 (2013.01);
Abstract

A secure IGP topology or other link state topology can be implemented by a network security unit that runs in a centralized environment on servers separate from a network associated with the IGP topology. The network security unit acquires the topology information, such as by participating in IGP or through border gateway protocol with link state (BGP-LS). The network security unit detects possible network problems, such as indicators of potential network attacks. Once an indicator of a potential network attack is detected, the network security unit identifies the node that is compromised. Once the compromised node is identified, the network security unit can report the node for manual or automated intervention. In some aspects, the network security unit can isolate the compromised node by shutting down links connected to the compromised node.


Find Patent Forward Citations

Loading…