18551981. NETWORK ACCESS ANOMALY DETECTION AND MITIGATION simplified abstract (Juniper Networks, Inc.)

From WikiPatents
Jump to navigation Jump to search

NETWORK ACCESS ANOMALY DETECTION AND MITIGATION

Organization Name

Juniper Networks, Inc.

Inventor(s)

Natarajan Manthiramoorthy of Fremont CA (US)

Raja Rao Tadimeti of San Jose CA (US)

Madhava Rao Cheethirala of San Jose CA (US)

NETWORK ACCESS ANOMALY DETECTION AND MITIGATION - A simplified explanation of the abstract

This abstract first appeared for US patent application 18551981 titled 'NETWORK ACCESS ANOMALY DETECTION AND MITIGATION

Simplified Explanation

The patent application describes techniques for network access anomaly detection and mitigation to improve network security for wired and/or wireless devices.

  • Receiving a network access request for a client device
  • Obtaining fingerprinting information of the client device
  • Determining if the client device is new or not
  • Checking for anomalies in the fingerprinting information compared to authorized client devices
  • Executing an access policy to manage network access based on anomalies found

Potential Applications

This technology can be applied in various industries such as cybersecurity, network security, IoT security, and access control systems.

Problems Solved

1. Enhances network security by detecting anomalies in device fingerprinting information. 2. Improves access control by managing network access based on anomalies found in client devices.

Benefits

1. Increased network security for both wired and wireless devices. 2. Efficient anomaly detection and mitigation techniques. 3. Enhanced access control for networks.

Potential Commercial Applications

"Network Access Anomaly Detection and Mitigation" can be utilized in industries such as cybersecurity firms, network security companies, IoT device manufacturers, and access control system providers.

Possible Prior Art

There are existing technologies for network access control and anomaly detection, but this specific combination of techniques for managing network access based on anomalies in client device fingerprinting information may be novel.

What are the specific techniques used for anomaly detection in this patent application?

The patent application describes the use of fingerprinting information to detect anomalies in client devices requesting network access. By comparing this information to previously obtained data from authorized devices, anomalies can be identified and access policies can be executed accordingly.

How does this technology contribute to improving network security for both wired and wireless devices?

This technology enhances network security by proactively detecting anomalies in client devices attempting to access the network. By identifying and mitigating potential threats, the overall security of the network is strengthened, protecting both wired and wireless devices from unauthorized access.


Original Abstract Submitted

Techniques are described for network access anomaly detection and mitigation that improves network security for wired and/or wireless devices. An example method includes receiving a network access request for a client device to access a network; obtaining fingerprinting information of the client device; determining whether the client device is a new client device requesting access to the network; in response to determining that the client device is not a new client device requesting access to the network, determining whether the fingerprinting information of the client device has an anomaly to previously obtained fingerprinting information of an authorized client device; and executing, in response to determining that the fingerprinting information of the client device has an anomaly to previously obtained fingerprinting information of the authorized client device, an access policy to manage access to the network by the client device associated with the network access request.