The present invention is directed to systems and methods for detecting unsolicited and threatening communications and communicating threat information related thereto. Threat information is received from one or more sources; such sources can include external security databases and threat information data from one or more application and/or network layer security systems. The received threat information is reduced into a canonical form. Features are extracted from the reduced threat information; these features in conjunction with configuration data such as goals are used to produce rules. In some embodiments, these rules are tested against one or more sets of test data and compared against the same or different goals; if one or more tests fail, the rules are refined until the tests succeed within an acceptable margin of error. The rules are then propagated to one or more application layer security systems.

 
Web www.patentalert.com

< Method and apparatus for adding data attributes to e-mail messages to enhance the analysis of delivery failures

< Data definition language

> Method and system for representing and accessing data for computer software applications

> System, method and computer program product for equipping wireless devices with malware scanning capabilities

~ 00283