The present invention is directed to systems and methods for detecting
unsolicited and threatening communications and communicating threat
information related thereto. Threat information is received from one or
more sources; such sources can include external security databases and
threat information data from one or more application and/or network layer
security systems. The received threat information is reduced into a
canonical form. Features are extracted from the reduced threat
information; these features in conjunction with configuration data such
as goals are used to produce rules. In some embodiments, these rules are
tested against one or more sets of test data and compared against the
same or different goals; if one or more tests fail, the rules are refined
until the tests succeed within an acceptable margin of error. The rules
are then propagated to one or more application layer security systems.