Rule-based network-threat detection

ABSTRACT

A packet-filtering device may receive packet-filtering rules configured to cause the packet-filtering device to identify packets corresponding to network-threat indicators. The packet-filtering device may receive packets and, for each packet, may determine that the packet corresponds to criteria specified by a packet-filtering rule. The criteria may correspond to one or more of the network-threat indicators. The packet-filtering device may apply an operator specified by the packet-filtering rule. The operator may be configured to cause the packet-filtering device to either prevent the packet from continuing toward its destination or allow the packet to continue toward its destination. The packet-filtering device may generate a log entry comprising information from the packet-filtering rule that identifies the one or more network-threat indicators and indicating whether the packet-filtering device prevented the packet from continuing toward its destination or allowed the packet to continue toward its destination.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a Continuation co-pending U.S. patent applicationSer. No. 14/690,302, filed Apr. 17, 2015, the content of which is herebyincorporated by reference into the present application.

BACKGROUND

Network security is becoming increasingly important as the informationage continues to unfold. Network threats may take a variety of forms(e.g., unauthorized requests or data transfers, viruses, malware, largevolumes of network traffic designed to overwhelm network resources, andthe like). Many organizations subscribe to network-threat services thatperiodically provide information associated with network threats, forexample, reports that include listings of network-threat indicators(e.g., network addresses, uniform resources identifiers (URIs), and thelike). The information provided by such services may be utilized byorganizations to identify network threats. For example, logs generatedby the organization's network devices may be reviewed for datacorresponding to the network-threat indicators provided by suchservices. But because the logs are generated based on the trafficprocessed by the network devices without regard to the network-threatindicators, this process is often tedious and time consuming and isexacerbated by the continuously evolving nature of potential threats.Accordingly, there is a need for rule-based network-threat detection.

SUMMARY

The following presents a simplified summary in order to provide a basicunderstanding of some aspects of the disclosure. It is intended neitherto identify key or critical elements of the disclosure nor to delineatethe scope of the disclosure. The following summary merely presents someconcepts of the disclosure in a simplified form as a prelude to thedescription below.

Aspects of this disclosure relate to rule-based network-threatdetection. In accordance with embodiments of the disclosure, apacket-filtering device may receive packet-filtering rules configured tocause the packet-filtering device to identify packets corresponding tonetwork-threat indicators. The packet-filtering device may receivepackets and, for each packet, may determine that the packet correspondsto criteria specified by a packet-filtering rule. The criteria maycorrespond to one or more of the network-threat indicators. Thepacket-filtering device may apply an operator specified by thepacket-filtering rule. The operator may be configured to cause thepacket-filtering device to either prevent the packet from continuingtoward its destination or allow the packet to continue toward itsdestination. The packet-filtering device may generate a log entrycomprising information from the packet-filtering rule that identifiesthe one or more network-threat indicators and indicating whether thepacket-filtering device prevented the packet from continuing toward itsdestination or allowed the packet to continue toward its destination.

In some embodiments, the packet-filtering device may generate andcommunicate to a user device data indicating whether thepacket-filtering device prevented the packet from continuing toward itsdestination or allowed the packet to continue toward its destination.The user device may receive the data and indicate in an interfacedisplayed by the user device whether the packet-filtering deviceprevented the packet from continuing toward its destination or allowedthe packet to continue toward its destination. The interface maycomprise an element that when invoked by a user of the user devicecauses the user device to instruct the packet-filtering device toreconfigure the operator to prevent future packets corresponding to thecriteria from continuing toward their respective destinations.

BRIEF DESCRIPTION OF THE DRAWINGS

The present disclosure is pointed out with particularity in the appendedclaims. Features of the disclosure will become more apparent upon areview of this disclosure in its entirety, including the drawing figuresprovided herewith.

Some features herein are illustrated by way of example, and not by wayof limitation, in the figures of the accompanying drawings, in whichlike reference numerals refer to similar elements, and wherein:

FIG. 1 depicts an illustrative environment for rule-based network-threatdetection in accordance with one or more aspects of the disclosure;

FIGS. 2A and 2B depict illustrative devices for rule-basednetwork-threat detection in accordance with one or more aspects of thedisclosure;

FIGS. 3A, 3B, 3C, 3D, 3E, and 3F depict an illustrative event sequencefor rule-based network-threat detection in accordance with one or moreaspects of the disclosure;

FIGS. 4A, 4B, and 4C depict illustrative packet-filtering rules forrule-based network-threat detection in accordance with one or moreaspects of the disclosure;

FIGS. 5A, 5B, 5C, 5D, 5E, 5F, and 5G depict illustrative logs forrule-based network-threat detection in accordance with one or moreaspects of the disclosure;

FIGS. 6A, 6B, 6C, 6D, 6E, 6F, and 6G depict illustrative interfaces forrule-based network-threat detection in accordance with one or moreaspects of the disclosure; and

FIG. 7 depicts an illustrative method for rule-based network-threatdetection in accordance with one or more aspects of the disclosure.

DETAILED DESCRIPTION

In the following description of various illustrative embodiments,reference is made to the accompanying drawings, which form a parthereof, and in which is shown, by way of illustration, variousembodiments in which aspects of the disclosure may be practiced. It isto be understood that other embodiments may be utilized, and structuraland functional modifications may be made, without departing from thescope of the disclosure.

Various connections between elements are discussed in the followingdescription. These connections are general and, unless specifiedotherwise, may be direct or indirect, wired or wireless. In thisrespect, the specification is not intended to be limiting.

FIG. 1 depicts an illustrative environment for rule-based network-threatdetection in accordance with one or more aspects of the disclosure.Referring to FIG. 1, environment 100 may include one or more networks.For example, environment 100 may include networks 102, 104, 106, and108. Networks 102, 104, and 106 may comprise one or more networks (e.g.,Local Area Networks (LANs), Wide Area Networks (WANs), Virtual PrivateNetworks (VPNs), or combinations thereof) associated with one or moreindividuals or entities (e.g., governments, corporations, serviceproviders, or other organizations). Network 108 may comprise one or morenetworks (e.g., LANs, WANs, VPNs, or combinations thereof) thatinterface networks 102, 104, and 106 with each other and one or moreother networks (not illustrated). For example, network 108 may comprisethe Internet, a similar network, or portions thereof.

Environment 100 may also include one or more hosts, such as computing ornetwork devices (e.g., servers, desktop computers, laptop computers,tablet computers, mobile devices, smartphones, routers, gateways,switches, access points, or the like). For example, network 102 mayinclude hosts 110, 112, and 114, network 104 may include hosts 116, 118,and 120, network 106 may include hosts 122, 124, and 126, and network108 may interface networks 102, 104, and 106 with one or more hostsassociated with rule provider 128 or network-threat-intelligenceproviders 130, 132, and 134, threat hosts 136, 138, and 140, and benignhost 142. Network-threat-intelligence providers 130, 132, and 134 may beassociated with services that monitor network threats (e.g., threatsassociated with threat hosts 136, 138, and 140) and disseminate (e.g.,to subscribers) network-threat-intelligence reports that includenetwork-threat indicators (e.g., network addresses, ports, fullyqualified domain names (FQDNs), uniform resource locators (URLs),uniform resource identifiers (URIs), or the like) associated with thenetwork threats, as well as other information associated with thenetwork threats, for example, the type of threat (e.g., phishingmalware, botnet malware, or the like), geographic information (e.g.,International Traffic in Arms Regulations (ITAR) country, Office ofForeign Assets Control (OFAC) country, or the like), anonymous proxies(e.g., Tor network, or the like), actors (e.g., the Russian BusinessNetwork (RBN), or the like).

Environment 100 may further include packet-filtering devices 144, 146,and 148. Packet-filtering device 144 may be located at boundary 150between networks 102 and 108. Similarly, packet-filtering device 146 maybe located at boundary 152 between networks 104 and 108, andpacket-filtering device 148 may be located at boundary 154 betweennetworks 106 and 108.

FIGS. 2A and 2B depict illustrative devices for rule-basednetwork-threat detection in accordance with one or more aspects of thedisclosure.

Referring to FIG. 2A, as indicated above, packet-filtering device 144may be located at boundary 150 between networks 102 and 108. Network 102may include one or more network devices 202 (e.g., servers, routers,gateways, switches, access points, or the like) that interface hosts110, 112, and 114 with network 108. Network 102 may also include tapdevices 204 and 206. Tap device 204 may be located on or have access toa communication path that interfaces network devices 202 and network 102(e.g., one or more of hosts 110, 112, and 114). Tap device 206 may belocated on or have access to a communication path that interfacesnetwork devices 202 and network 108. Packet-filtering device 144 mayinclude memory 208, one or more processors 210, one or morecommunication interfaces 212, and data bus 214. Data bus 214 mayinterface memory 208, processors 210, and communication interfaces 212.Communication interfaces 212 may interface packet-filtering device 144with network devices 202 and tap devices 204 and 206. Memory 208 maycomprise one or more program modules 216, one or more packet-filteringrules 218, and one or more logs 220. Program modules 216 may compriseinstructions that when executed by processors 210 cause packet-filteringdevice 144 to perform one or more of the functions described herein.Networks 104 and 106 may each comprise components similar to thosedescribed herein with respect to network 102, and packet-filteringdevices 146 and 148 may each comprise components similar to thosedescribed herein with respect to packet-filtering device 144.

Referring to FIG. 2B, rule provider 128 may include one or morecomputing devices 222. Computing devices 222 may include memory 224, oneor more processors 226, one or more communication interfaces 228, anddata bus 230. Data bus 230 may interface memory 224, processors 226, andcommunication interfaces 228. Communication interfaces 228 may interfacecomputing devices 222 with network 108, which, as indicated above, mayinterface with network 102 at boundary 150. Memory 224 may comprise oneor more program modules 232, one or more network-threat indicators 234,and one or more packet-filtering rules 236. Program modules 232 maycomprise instructions that when executed by processors 226 causecomputing devices 222 to perform one or more of the functions describedherein.

FIGS. 3A, 3B, 3C, 3D, 3E, and 3F depict an illustrative event sequencefor rule-based network-threat detection in accordance with one or moreaspects of the disclosure. In reviewing the illustrative event sequence,it will be appreciated that the number, order, and timing of theillustrative events is simplified for the purpose of illustration andthat additional (unillustrated) events may occur, the order and time ofevents may differ from the depicted illustrative events, and some eventsor steps may be omitted, combined, or occur in an order other than thatdepicted by the illustrative event sequence.

Referring to FIG. 3A, at step 1, network-threat-intelligence provider130 may communicate to rule provider 128 (e.g., via network 108, asdesignated by the shaded box over the line extending downward fromnetwork 108) one or more network-threat-intelligence reports identifyingone or more network threats (e.g., Threat_1, Threat_2, Threat_3, andThreat_4) and comprising one or more associated network-threatindicators (e.g., network addresses, ports, FQDNs, URLs, URIs, or thelike), as well as other information associated with the network threats(e.g., the type of threat, geographic information, anonymous proxies,actors, or the like). Similarly, at step 2, network-threat-intelligenceprovider 132 may communicate to rule provider 128 one or morenetwork-threat-intelligence reports identifying one or more networkthreats (e.g., Threat_1, Threat_2, Threat_5, and Threat_6) andcomprising one or more associated network-threat indicators, as well asother information associated with the network threats, and, at step 3,network-threat-intelligence provider 134 may communicate to ruleprovider 128 one or more network-threat-intelligence reports identifyingone or more network threats (e.g., Threat_1, Threat_7, Threat_8, andThreat_9) and comprising one or more associated network-threatindicators, as well as other information associated with the networkthreats. Rule provider 128 (e.g., computing devices 222) may receive(e.g., via communication interfaces 228) the network-threat-intelligencereports communicated by network-threat-intelligence providers 130, 132,and 134, and may store data contained therein in memory 224 (e.g.,network-threat indicators 234).

Referring to FIG. 3B, at step 4, packet-filtering device 144 maycommunicate one or more parameters to rule provider 128 (e.g.,parameters indicating a preference, authorization, subscription, or thelike to receive packet-filtering rules generated based onnetwork-threat-intelligence reports provided bynetwork-threat-intelligence providers 130, 132, and 134). At step 5,rule provider 128 (e.g., computing devices 222) may generate one or morepacket-filtering rules (e.g., packet-filtering rules 236) based on thenetwork-threat-intelligence reports provided bynetwork-threat-intelligence providers 130, 132, and 134 (e.g.,network-threat indicators 234) and, at step 6, may communicate thepacket-filtering rules to packet-filtering device 144, which, at step 7,may update packet-filtering rules 218 to include the packet-filteringrules generated by rule provider 128 in step 5.

For example, referring to FIG. 4A, packet-filtering rules 218 mayinclude packet-filtering rules 402 that comprisenon-network-threat-intelligence rules (e.g., packet-filtering rulesgenerated by an administrator of network 102) and packet-filtering rules404 that comprise network-threat-intelligence rules (e.g., thepacket-filtering rules communicated by rule provider 128 in step 6).Each of the network-threat-intelligence rules may comprise: one or morecriteria that correspond to one or more of network-threat indicators 234upon which the rule is based and may be configured to causepacket-filtering device 144 to identify packets corresponding to thecriteria (e.g., corresponding to the network-threat indicators uponwhich the rule is based); an operator configured to causepacket-filtering device 144 to either prevent packets corresponding tothe criteria from continuing toward their respective destinations (e.g.,a BLOCK operator) or allow packets corresponding to the criteria tocontinue toward their respective destinations (e.g., an ALLOW operator);and information distinct from the criteria (e.g., a Threat ID) thatidentifies one or more of the network-threat indicators upon which therule is based, one or more network threats associated with thenetwork-threat indicators, one or more network-threat-intelligencereports that included the network-threat indicators, one or more ofnetwork-threat-intelligence providers 130, 132, or 134 that provided thenetwork-threat-intelligence reports, or other information contained inthe network-threat-intelligence reports that is associated with thenetwork-threat indicators or the network threats (e.g., the type ofthreat, geographic information, anonymous proxies, actors, or the like).

Returning to FIG. 3B, at step 8, packet-filtering device 146 maycommunicate one or more parameters to rule provider 128 (e.g.,parameters indicating a preference, authorization, subscription, or thelike to receive packet-filtering rules generated based onnetwork-threat-intelligence reports provided bynetwork-threat-intelligence provider 134). At step 9, rule provider 128may generate one or more packet-filtering rules based on thenetwork-threat-intelligence reports provided bynetwork-threat-intelligence provider 134 (e.g., network-threatindicators 234 (or a portion thereof included innetwork-threat-intelligence reports received fromnetwork-threat-intelligence provider 134)) and, at step 10, maycommunicate the packet-filtering rules to packet-filtering device 146,which, at step 11, may update its packet-filtering rules to include thepacket-filtering rules generated by rule provider 128 in step 9.Similarly, at step 12, packet-filtering device 148 may communicate oneor more parameters to rule provider 128 (e.g., parameters indicating apreference, authorization, subscription, or the like to receivepacket-filtering rules generated based on network-threat-intelligencereports provided by network-threat-intelligence providers 132 and 134).At step 13, rule provider 128 may generate one or more packet-filteringrules based on the network-threat-intelligence reports provided bynetwork-threat-intelligence providers 132 and 134 (e.g., network-threatindicators 234 (or a portion thereof included innetwork-threat-intelligence reports received fromnetwork-threat-intelligence providers 132 and 134)) and, at step 14, maycommunicate the packet-filtering rules to packet-filtering device 148,which, at step 15, may update its packet-filtering rules to include thepacket-filtering rules generated by rule provider 128 in step 13.

Referring to FIG. 3C, at step 16, four packets may be communicated(e.g., via network 108, as designated by the shaded circles over theline extending downward from network 108) between host 114 and benignhost 142 (e.g., two packets originating from host 114 and destined forbenign host 142 and two packets originating from benign host 142 anddestined for host 114), and packet-filtering device 144 may receive eachof the four packets (e.g., via tap devices 204 and 206), apply one ormore of packet-filtering rules 218 to the four packets, and allow thefour packets to continue toward their respective destinations.

At step 17, three packets may be communicated by host 112 to threat host136, and packet-filtering device 144 may receive each of the threepackets, apply one or more of packet-filtering rules 218 to the threepackets, determine that each of the three packets corresponds tocriteria specified by a packet-filtering rule of packet-filtering rules404 (e.g., Rule: TI003), apply an operator specified by thepacket-filtering rule (e.g., an ALLOW operator) to each of the threepackets, allow each of the three packets to continue toward itsrespective destination (e.g., toward threat host 136), and generate logdata for each of the three packets (as designated by the triangles overthe line extending downward from packet-filtering device 144).

At step 18, packet-filtering device 144 may begin processing the logdata generated in step 17. For example, referring to FIG. 5A, logs 220may include packet log 502 and flow log 504, each of which (or portionsthereof) may be reserved or distinguished for entries associated withpackets corresponding to criteria included in packet-filtering rules404, and packet-filtering device 144 may generate an entry in packet log502 for each of the three packets. Each entry may comprise dataindicating a hit time for the packet (e.g., a time at which the packetwas received by packet-filtering device 144, identified bypacket-filtering device 144, or the like), data derived from the packet(e.g., a source address, a destination address, a port number, aprotocol type, a domain name, URL, URI, or the like), one or moreenvironmental variables (e.g., an identifier of an interface ofpacket-filtering device 144 over which the packet was received, anidentifier of an interface of packet-filtering device 144 over which thepacket was forwarded toward its destination, an identifier associatedwith packet-filtering device 144 (e.g., distinguishing packet-filteringdevice 144 from packet-filtering devices 146 and 148), or the like),data identifying the packet-filtering rule of packet-filtering rules 404to which the packet corresponded (e.g., Thread ID: Threat_3), and dataindicating whether packet-filtering device 144 prevented the packet fromcontinuing toward its destination or allowed the packet to continuetoward its destination (e.g., the character A may designate thatpacket-filtering device 144 allowed the packet to continue toward itsdestination, and the character B may designate that packet-filteringdevice 144 prevented the packet from continuing toward its destination).

Returning to FIG. 3C, at step 19, four packets may be communicatedbetween host 114 and threat host 138 (e.g., two packets originating fromhost 114 and destined for threat host 138 and two packets originatingfrom threat host 138 and destined for host 114), and packet-filteringdevice 144 may receive each of the four packets, apply one or more ofpacket-filtering rules 218 to the four packets, determine that each ofthe four packets corresponds to criteria specified by a packet-filteringrule of packet-filtering rules 404 (e.g., Rule: TI005), apply anoperator specified by the packet-filtering rule (e.g., an ALLOWoperator) to each of the four packets, allow each of the four packets tocontinue toward its respective destination, and generate log data foreach of the four packets. In some embodiments, the criteria specified byone or more of packet-filtering rules 404 (e.g., the criteria generatedfrom the network-threat indicators) may include network addresses andone or more of the packets received by packet-filtering device 144 maycomprise domain names, URIs, or URLs. In such embodiments,packet-filtering device 144 may comprise a local domain name system(DNS) cache (e.g., stored in memory 208) and may utilize the local DNScache to resolve one or more of the domain names, URIs, or URLs includedin the packets into one or more of the network addresses included in thecriteria.

At step 20, packet-filtering device 144 may continue processing the logdata generated in step 17 and may begin processing the log datagenerated in step 19. In some embodiments, packet-filtering device 144may be configured in accordance with work-conserving scheduling in orderto minimize latency (e.g., the time between when a packet correspondingto a network threat crosses boundary 150 and the time when anadministrator associated with network 102 is presented with an interfaceindicating that the packet corresponding to the network threat hascrossed boundary 150). For example, referring to FIG. 5B,packet-filtering device 144 may generate entries in packet log 502 foreach of the packets received in step 19 while generating an entry inflow log 504 for the packets received in step 17. Packet-filteringdevice 144 may generate the entry in flow log 504 for the packetsreceived in step 17 based on the entries generated in packet log 502(e.g., in step 18) for the packets received in step 17. The entry inflow log 504 may consolidate, compress, or summarize the entries inpacket log 502. For example, the entry in flow log 504 may comprise atime range (e.g., [01, 03]) indicating the earliest hit time indicatedby the entries (e.g., Time: 01) to the latest hit time indicated by theentries (e.g., Time: 03), consolidated information from the entries(e.g., a consolidation of the information derived from the packets andthe environmental variables), information that each of the associatedpackets have in common (e.g., Threat ID: Threat_3), a count of theassociated packets allowed by packet-filtering device 144 to continuetoward their respective destinations, and a count of the associatedpackets prevented by packet-filtering device 144 from continuing towardtheir respective destinations.

Returning to FIG. 3C, at step 21, packet-filtering device 144 mayutilize flow log 504 to generate data comprising an update for aninterface associated with packet-filtering device 144 and displayed byhost 110, and may communicate the data comprising the update to host110. For example, referring to FIG. 6A, host 110 may be a user deviceassociated with an administrator of network 102 and configured todisplay interface 600. Interface 600 may include graphical depictions602 and 604, which may illustrate activity associated withpacket-filtering device 144. For example, graphical depiction 602 maycomprise a line chart depicting, for a user-specified time interval, anumber of packet hits, a number of packets prevented from continuingtoward their respective destinations, a number of packets allowed tocontinue toward their respective destinations, or the like, andgraphical depiction 604 may comprise an annulated pie chart illustratingpercentages of hits during the user-specified time interval that areassociated with various category types (e.g., type of network threat,geographic information, anonymous proxies, actors, or the like).

Interface 600 may also include listing 606, which may comprise entriescorresponding to network threats and, for each threat, associatedinformation derived by packet-filtering device 144 from flow log 504(e.g., a description of the threat, information derived from theconsolidated information stored in flow log 504, the time of the lastassociated packet hit, a count of associated packet hits, a count ofassociated packets allowed by packet-filtering device 144 to continuetoward their respective destinations, a count of associated packetsprevented by packet-filtering device 144 from continuing toward theirrespective destinations) and a status of the operator included in therule associated with the threat.

Packet-filtering device 144 may be configured to determine an orderingof the network threats, and listing 606 may be displayed in accordancewith the ordering determined by packet-filtering device 144. In someembodiments, packet-filtering device 144 may be configured to determinea score for each of the network threats and the ordering may bedetermined based on the scores. In such embodiments, the scores may bedetermined based on a number of associated packet hits, times associatedwith the packet hits (e.g., time of day, time since last hit, or thelike), whether the packet was destined for a network address associatedwith a host in network 102 or a host in network 108, one or morenetwork-threat-intelligence providers that provided the network-threatindicators associated with the threat, the number of network-threatintelligence providers that provided the network-threat indicatorsassociated with the threat, other information associated with thenetwork threat (e.g., type of network threat, geographic information,anonymous proxies, actors, or the like).

For example, as illustrated in FIG. 6A, the threat associated withThreat ID: Threat_1 may be assigned a score (e.g., 6) higher than thescore assigned to the threat associated with Threat ID: Threat_2 (e.g.,5) based on a determination that the network-threat-indicatorscorresponding to the threat associated with Threat ID: Threat_1 werereceived from three different network-threat-intelligence providers(e.g., network-threat-intelligence providers 130, 132, and 134) and adetermination that the network-threat-indicators corresponding to thethreat associated with Threat ID: Threat_2 were received from twodifferent network-threat-intelligence providers (e.g.,network-threat-intelligence providers 130 and 132). Similarly, thethreat associated with Threat ID: Threat_2 may be assigned a score(e.g., 5) higher than the score assigned to the threat associated withThreat ID: Threat_3 (e.g., 4) based on a determination that thenetwork-threat-indicators corresponding to the threat associated withThreat ID: Threat_2 were received from two differentnetwork-threat-intelligence providers (e.g., network-threat-intelligenceproviders 130 and 132) and a determination that thenetwork-threat-indicators corresponding to the threat associated withThreat ID: Threat_3 were received from one network-threat-intelligenceprovider (e.g., network-threat-intelligence provider 130). Additionally,the threat associated with Threat ID: Threat_3 may be assigned a score(e.g., 4) higher than the score assigned to the threat associated withThreat ID: Threat_5 (e.g., 2) based on a determination that the lastpacket hit corresponding to the threat associated with Threat ID:Threat_3 is more recent than the last packet hit corresponding to thethreat associated with Threat ID: Threat_5, and the threat associatedwith Threat ID: Threat_4 may be assigned a score (e.g., 2) higher thanthe score assigned to the threat associated with Threat ID: Threat_9(e.g., 1) based on a determination that the network-threat-indicatorscorresponding to the threat associated with Threat ID: Threat_4 werereceived from network-threat-intelligence provider 130 and adetermination that the network-threat-indicators corresponding to thethreat associated with Threat ID: Threat_9 were received fromnetwork-threat-intelligence provider 134 (e.g., thenetwork-threat-intelligence reports produced bynetwork-threat-intelligence provider 130 may be regarded as morereliable than the network-threat-intelligence reports produced bynetwork-threat-intelligence provider 134).

Returning to FIG. 3C, at step 22, three packets may be communicated bythreat host 140 to host 114, and packet-filtering device 144 may receiveeach of the three packets, apply one or more of packet-filtering rules218 to the three packets, determine that each of the three packetscorresponds to criteria specified by a packet-filtering rule ofpacket-filtering rules 404 (e.g., Rule: TI001), apply an operatorspecified by the packet-filtering rule (e.g., an ALLOW operator) to eachof the three packets, allow each of the three packets to continue towardits respective destination (e.g., toward host 114), and generate logdata for each of the three packets.

At step 23, packet-filtering device 144 may continue processing the logdata generated in step 19 and may begin processing the log datagenerated in step 22. For example, referring to FIG. 5C,packet-filtering device 144 may generate entries in packet log 502 foreach of the packets received in step 22 while generating an entry inflow log 504 for the packets received in step 19 based on the entriesgenerated in packet log 502 (e.g., in step 20) for the packets receivedin step 19.

Returning to FIG. 3C, at step 24, packet-filtering device 144 mayutilize flow log 504 to generate data comprising an update for interface600 and may communicate the data to host 110. For example, referring toFIG. 6B, the update may cause interface 600 to update an entry inlisting 606 corresponding to the threat associated with Threat ID:Threat_5 to reflect the packets received in step 19 and to reflect a newscore (e.g., 3) assigned by packet-filtering device 144 to the threatassociated with Threat ID: Threat_5 (e.g., the score may have increasedbased on the packets received in step 19).

Interface 600 may include one or more block options that when invoked bya user of host 110 (e.g., the administrator of network 102) cause host110 to instruct packet-filtering device 144 to reconfigure an operatorof a packet-filtering rule included in packet-filtering rules 404 toprevent packets corresponding to the criteria specified by thepacket-filtering rule from continuing toward their respectivedestinations. In some embodiments, listing 606 may include such a blockoption alongside each entry, and, when invoked, the block option maycause host 110 to instruct packet-filtering device 144 to reconfigure anoperator of packet-filtering rules 404 that corresponds to the networkthreat associated with the entry. For example, interface 600 may includeblock option 608, which, when invoked, may cause host 110 to instructpacket-filtering device 144 to reconfigure an operator associated withRule: TI003 (e.g., to reconfigure the operator to cause packet-filteringdevice 144 to prevent packets corresponding to the one or more criteriaspecified by Rule: TI003 (e.g., packets corresponding to thenetwork-threat-indicators associated with Threat ID: Threat_3) fromcontinuing toward their respective destinations).

Additionally or alternatively, when invoked, such a block option maycause host 110 to display another interface (e.g., an overlay, pop-upinterface, or the like) associated with packet-filtering device 144. Forexample, referring to FIG. 6C, when invoked, block option 608 may causehost 110 to display interface 610. Interface 610 may comprise specificblock options 612, 614, 616, and 618, modify option 620, and canceloption 622. Specific block option 612 may correspond to an option toreconfigure packet-filtering device 144 to prevent packets correspondingto the network threat and destined for or originating from a host innetwork 102 from continuing toward their respective destinations.Specific block option 614 may correspond to an option to reconfigurepacket-filtering device 144 to prevent packets corresponding to thenetwork threat and destined for or originating from one or moreparticular hosts in network 102 that have generated or received packetsassociated with the network threat (e.g., host 112) from continuingtoward their respective destinations. Specific block option 616 maycorrespond to an option to reconfigure packet-filtering device 144 toprevent any packets received from the particular hosts in network 102that have generated or received packets associated with the networkthreat from continuing toward hosts located in network 102. And specificblock option 618 may correspond to an option to reconfigurepacket-filtering device 144 to prevent any packets received from theparticular hosts in network 102 that have generated or received packetsassociated with the network threat from continuing toward hosts locatedin network 108.

Interface 610 may also include rule-preview listing 624, which maydisplay a listing of rules that will be implemented by packet-filteringdevice 144 in response to the user invoking modify option 620.Rule-preview listing 624 may include one or more entries correspondingto each of specific block options 612, 614, 616, and 618. For example,entry 626 may correspond to, and display a rule configured to implement,specific block option 612 (e.g., Rule: TI003 with its operatorreconfigured to BLOCK). Similarly, entries 628, 630, and 632 maycorrespond to, and display rules configured to implement, specific blockoptions 614, 616, and 618 (e.g., one or more new rules generated bypacket-filtering device 144 based on data derived from flow log 504(e.g., a network address associated with host 112)). Responsive to auser invoking one or more of specific block options 612, 614, 616, or618, the interface may select the corresponding rules, and responsive toa user invoking modify option 620, host 110 may instructpacket-filtering device 144 to implement the selected rules. Responsiveto a user invoking cancel option 620, host 110 may redisplay interface600.

Returning to FIG. 3C, at step 25, host 110 may communicate instructionsto packet-filtering device 144 instructing packet-filtering device 144to reconfigure one or more of packet-filtering rules 404 (e.g., toreconfigure the operator of Rule: TI003 to BLOCK), and, at step 26,packet-filtering device 144 may reconfigure packet-filtering rules 404accordingly, as reflected in FIG. 4B.

At step 27, three packets destined for threat host 136 may becommunicated by host 112, and packet-filtering device 144 may receiveeach of the three packets, apply one or more of packet-filtering rules218 to the three packets, determine that each of the three packetscorresponds to criteria specified by a packet-filtering rule ofpacket-filtering rules 404 (e.g., Rule: TI003), apply an operatorspecified by the packet-filtering rule (e.g., the BLOCK operator) toeach of the three packets, prevent each of the three packets fromcontinuing toward its respective destination (e.g., toward threat host136), and generate log data for each of the three packets.

At step 28, packet-filtering device 144 may continue processing the logdata generated in step 22 and may begin processing the log datagenerated in step 27. For example, referring to FIG. 5D,packet-filtering device 144 may generate entries in packet log 502 foreach of the packets received in step 27 while generating an entry inflow log 504 for the packets received in step 22 based on the entriesgenerated in packet log 502 (e.g., in step 23) for the packets receivedin step 22.

Returning to FIG. 3C, at step 29, packet-filtering device 144 mayutilize flow log 504 to generate data comprising an update for interface600 and may communicate the data to host 110. For example, referring toFIG. 6D, the update may cause interface 600 to update an entry inlisting 606 that is associated with the threat associated with ThreatID: Threat_1 to reflect the packets received in step 22, the change inthe operator of the packet-filtering rule associated with the threatassociated with Thread ID: Threat_3, a new score (e.g., 7) assigned bypacket-filtering device 144 to the threat associated with Threat ID:Threat_1 (e.g., the score may have increased based on the packetsreceived in step 22), a new score (e.g., 2) assigned by packet-filteringdevice 144 to the threat associated with Threat ID: Threat_3 (e.g., thescore may have decreased based on the change of the operator in itsassociated packet-filtering rule), a new score (e.g., 4) assigned bypacket-filtering device 144 to the threat associated with Threat ID:Threat_5, and a revised ordering, determined by packet-filtering device144 based on the new scores.

Referring to FIG. 3D, at step 30, three packets destined for host 120may be communicated by threat host 140, and packet-filtering device 146may receive each of the three packets, apply one or more of itspacket-filtering rules to the three packets, determine that each of thethree packets corresponds to criteria specified by a packet-filteringrule (e.g., a rule corresponding to Threat ID: Threat_1), apply anoperator specified by the packet-filtering rule (e.g., an ALLOWoperator) to each of the three packets, allow each of the three packetsto continue toward its respective destination (e.g., toward host 120),and generate log data for each of the three packets. At step 31,packet-filtering device 146 may begin processing the log data generatedin step 30.

At step 32, three packets destined for host 118 may be communicated bythreat host 140, and packet-filtering device 146 may receive each of thethree packets, apply one or more of its packet-filtering rules to thethree packets, determine that each of the three packets corresponds tocriteria specified by a packet-filtering rule (e.g., the rulecorresponding to Threat ID: Threat_1), apply an operator specified bythe packet-filtering rule (e.g., an ALLOW operator) to each of the threepackets, allow each of the three packets to continue toward itsrespective destination (e.g., toward host 118), and generate log datafor each of the three packets.

At step 33, packet-filtering device 146 may continue processing the logdata generated in step 30 and may begin processing the log datagenerated in step 33. At step 34, packet-filtering device 146 maygenerate data comprising an update for an interface associated withpacket-filtering device 146 and displayed by host 116 (e.g., aninterface similar to interface 600) and may communicate the datacomprising the update to host 116.

At step 35, three packets destined for host 120 may be communicated bythreat host 140, and packet-filtering device 146 may receive each of thethree packets, apply one or more of its packet-filtering rules to thethree packets, determine that each of the three packets corresponds tocriteria specified by a packet-filtering rule (e.g., the rulecorresponding to Threat ID: Threat_1), apply an operator specified bythe packet-filtering rule (e.g., an ALLOW operator) to each of the threepackets, allow each of the three packets to continue toward itsrespective destination (e.g., toward host 120), and generate log datafor each of the three packets. At step 36, packet-filtering device 146may continue processing the log data generated in step 32 and may beginprocessing the log data generated in step 35.

At step 37, packet-filtering device 146 may generate data comprising anupdate for the interface associated with packet-filtering device 146 anddisplayed by host 116 and may communicate the data comprising the updateto host 116. At step 38, host 116 may communicate instructions topacket-filtering device 146 instructing packet-filtering device 146 toreconfigure one or more of its packet-filtering rules (e.g., toreconfigure the operator of the rule corresponding to Threat ID:Threat_1 to BLOCK), and, at step 39, packet-filtering device 146 mayreconfigure its packet-filtering rules accordingly.

At step 40, three packets destined for host 118 and three packetsdestined for host 120 may be communicated by threat host 140, andpacket-filtering device 146 may receive each of the six packets, applyone or more of its packet-filtering rules to the six packets, determinethat each of the six packets corresponds to criteria specified by apacket-filtering rule (e.g., the rule corresponding to Threat ID:Threat_1), apply an operator specified by the packet-filtering rule(e.g., the BLOCK operator) to each of the six packets, prevent each ofthe six packets from continuing toward its respective destination, andgenerate log data for each of the six packets. At step 41,packet-filtering device 146 may continue processing the log datagenerated in step 35 and may begin processing the log data generated instep 40.

At step 42, packet-filtering device 146 may communicate data to ruleprovider 128 (e.g., data indicating that fifteen packets correspondingto Threat ID: Threat_1 were received by packet-filtering device 146,packet-filtering device 146 allowed nine of the fifteen packets tocontinue toward hosts in network 104, and packet-filtering device 146prevented six of the fifteen packets from continuing toward hosts innetwork 104).

Referring to FIG. 3E, at step 43, four packets may be communicatedbetween host 124 and threat host 136 (e.g., two packets originating fromhost 124 and destined for threat host 136 and two packets originatingfrom threat host 136 and destined for host 124), and packet-filteringdevice 148 may receive each of the four packets, apply one or more ofits packet-filtering rules to the four packets, and allow the fourpackets to continue toward their respective destinations.

At step 44, three packets destined for host 126 may be communicated bythreat host 140, and packet-filtering device 148 may receive each of thethree packets, apply one or more of its packet-filtering rules to thethree packets, determine that each of the three packets corresponds tocriteria specified by a packet-filtering rule (e.g., a rulecorresponding to Threat ID: Threat_1), apply an operator specified bythe packet-filtering rule (e.g., an ALLOW operator) to each of the threepackets, allow each of the three packets to continue toward itsrespective destination (e.g., toward host 126), and generate log datafor each of the three packets. At step 45, packet-filtering device 148may begin processing the log data generated in step 44.

At step 46, three packets destined for host 126 may be communicated bythreat host 140, and packet-filtering device 148 may receive each of thethree packets, apply one or more of its packet-filtering rules to thethree packets, determine that each of the three packets corresponds tocriteria specified by a packet-filtering rule (e.g., the rulecorresponding to Threat ID: Threat_1), apply an operator specified bythe packet-filtering rule (e.g., an ALLOW operator) to each of the threepackets, allow each of the three packets to continue toward itsrespective destination (e.g., toward host 126), and generate log datafor each of the three packets.

At step 47, packet-filtering device 148 may continue processing the logdata generated in step 44 and may begin processing the log datagenerated in step 47. At step 48, packet-filtering device 148 maygenerate data comprising an update for an interface associated withpacket-filtering device 148 and displayed by host 122 (e.g., aninterface similar to interface 600) and may communicate the datacomprising the update to host 122.

At step 49, two packets may be communicated between host 124 and threathost 138 (e.g., a packet originating from host 124 and destined forthreat host 138 and a packet originating from threat host 138 anddestined for host 124), and packet-filtering device 148 may receive eachof the two packets, apply one or more of its packet-filtering rules tothe two packets, determine that each of the two packets corresponds tocriteria specified by a packet-filtering rule (e.g., a rulecorresponding to Threat ID: Threat_5), apply an operator specified bythe packet-filtering rule (e.g., an ALLOW operator) to each of the twopackets, allow each of the two packets to continue toward its respectivedestination, and generate log data for each of the two packets. At step50, packet-filtering device 148 may continue processing the log datagenerated in step 46 and may begin processing the log data generated instep 49.

At step 51, packet-filtering device 148 may generate data comprising anupdate for the interface associated with packet-filtering device 148 anddisplayed by host 122 and may communicate the data comprising the updateto host 122. At step 52, host 122 may communicate instructions topacket-filtering device 148 instructing packet-filtering device 148 toreconfigure one or more of its packet-filtering rules to block allpackets corresponding to the network-threat indicators associated withThreat ID: Threat_1 (e.g., to reconfigure the operator of the rulecorresponding to Threat ID: Threat_1 to BLOCK), and to implement one ormore new packet-filtering rules configured to block all packetsoriginating from host 126, and, at step 53, packet-filtering device 148may reconfigure its packet-filtering rules accordingly.

At step 54, threat host 140 may generate a packet destined for host 124and a packet destined for host 126, host 126 may generate a packetdestined for benign host 142 and a packet destined for host 124, andpacket-filtering device 148 may receive each of the four packets, applyone or more of its packet-filtering rules to the four packets, determinethat the packets generated by threat host 140 correspond to criteriaspecified by the packet-filtering rule corresponding to Threat ID:Threat_1, apply an operator specified by the packet-filtering rulecorresponding to Threat ID: Threat_1 (e.g., the BLOCK operator) to eachof the two packets generated by threat host 140, determine that thepackets generated by host 126 correspond to criteria specified by thenew packet-filtering rules (e.g., a network address associated with host126), apply an operator specified by the new packet-filtering rules(e.g., the BLOCK operator) to each of the two packets generated by host126, prevent each of the four packets from continuing toward itsrespective destination, and generate log data for each of the fourpackets.

At step 55, packet-filtering device 148 may continue processing the logdata generated in step 49 and may begin processing the log datagenerated in step 54. At step 56, packet-filtering device 148 maycommunicate data to rule provider 128 (e.g., data indicating that eightpackets corresponding to Threat ID: Threat_1 were received bypacket-filtering device 148, packet-filtering device 148 allowed six ofthe eight packets to continue toward hosts in network 106,packet-filtering device 148 prevented two of the eight packets fromcontinuing toward hosts in network 106, two packets corresponding toThreat ID: Threat_5 were received by packet-filtering device 148, andpacket-filtering device 148 allowed both of the two packets to continuetoward their respective destinations).

Referring to FIG. 3F, at step 57, rule provider 128 (e.g., computingdevices 222) may analyze the data received from packet-filtering devices146 and 148 (e.g., in steps 42 and 56, respectively) and may generate,based on the analysis, an update for packet-filtering device 148. Insome embodiments, the update may be configured to cause packet-filteringdevice 144 to reconfigure an operator of a packet-filtering ruleincluded in packet-filtering rules 404 (e.g., to reconfigurepacket-filtering device 144 to prevent packets corresponding to thecriteria specified by the rule from continuing toward their respectivedestinations). Additionally or alternatively, the update may reconfigureone or more of packet-filtering rules 404 to affect the ordering (e.g.,the scoring) of the network threats associated with packet-filteringrules 404. At step 58, rule provider 128 may communicate the updates topacket-filtering device 144, which may receive the updates and, at step59, may update packet-filtering rules 404 accordingly. For example, theupdate may be configured to cause packet-filtering device 144 toreconfigure the operator of Rule: TI001 to the BLOCK operator (e.g., toreconfigure packet-filtering device 144 to prevent packets correspondingto the network-threat indicators associated with the network threatcorresponding to Threat ID: Threat_1 from continuing toward theirrespective destinations, and packet-filtering device 144 may reconfigurepacket-filtering rules 404 accordingly, as reflected in FIG. 4C).

At step 60, four packets may be communicated between host 114 and benignhost 142 (e.g., two packets originating from host 114 and destined forbenign host 142 and two packets originating from benign host 142 anddestined for host 114), and packet-filtering device 144 may receive eachof the four packets, apply one or more of packet-filtering rules 218 tothe four packets, and allow the four packets to continue toward theirrespective destinations.

At step 61, three packets destined for threat host 136 may becommunicated by host 112, and packet-filtering device 144 may receiveeach of the three packets, apply one or more of packet-filtering rules218 to the three packets, determine that each of the three packetscorresponds to criteria specified by a packet-filtering rule ofpacket-filtering rules 404 (e.g., Rule: TI003), apply an operatorspecified by the packet-filtering rule (e.g., the BLOCK operator) toeach of the three packets, prevent each of the three packets fromcontinuing toward its respective destination (e.g., toward threat host136), and generate log data for each of the three packets.

At step 62, packet-filtering device 144 may continue processing the logdata generated in step 27 and may begin processing the log datagenerated in step 62. For example, referring to FIG. 5E,packet-filtering device 144 may generate entries in packet log 502 foreach of the packets received in step 61 while modifying an entry in flowlog 504 for the packets received in step 27 based on the entriesgenerated in packet log 502 (e.g., in step 28) for the packets receivedin step 27, for example, modifying the entry corresponding to Threat ID:Threat_3) (e.g., the time range and the count of associated packetsprevented by packet-filtering device 144 from continuing toward theirrespective destinations).

At step 63, packet-filtering device 144 may utilize flow log 504 togenerate data comprising an update for interface 600 and may communicatethe data to host 110. For example, referring to FIG. 6E, the update maycause interface 600 to update the entry in listing 606 associated withThreat ID: Threat_3 to reflect the packets received in step 27, thechange in the operator of the packet-filtering rule associated withThread ID: Threat_1, a new score (e.g., 3) assigned by packet-filteringdevice 144 to the threat associated with Threat ID: Threat_3 (e.g., thescore may have increased based on the packets received in step 27), anda new score (e.g., 5) assigned by packet-filtering device 144 to thethreat associated with Threat ID: Threat_1 (e.g., the score may havedecreased based on the change of the operator in its associatedpacket-filtering rule).

At step 64, three packets destined for host 112 and three packetsdestined for host 114 may be communicated by threat host 140, andpacket-filtering device 144 may receive each of the six packets, applyone or more of packet-filtering rules 218 to the three packets,determine that each of the three packets corresponds to criteriaspecified by a packet-filtering rule of packet-filtering rules 404(e.g., Rule: TI001), apply an operator specified by the packet-filteringrule (e.g., the BLOCK operator) to each of the six packets, prevent eachof the six packets from continuing toward its respective destination,and generate log data for each of the six packets.

At step 65, packet-filtering device 144 may continue processing the logdata generated in step 61 and may begin processing the log datagenerated in step 64. For example, referring to FIG. 5F,packet-filtering device 144 may generate entries in packet log 502 foreach of the packets received in step 64 while modifying an entry in flowlog 504 for the packets received in step 61 based on the entriesgenerated in packet log 502 (e.g., in step 62) for the packets receivedin step 61, for example, modifying the entry corresponding to Threat ID:Threat_3 (e.g., the time range and the count of associated packetsprevented by packet-filtering device 144 from continuing toward theirrespective destinations).

At step 66, packet-filtering device 144 may utilize flow log 504 togenerate data comprising an update for interface 600 and may communicatethe data to host 110. For example, referring to FIG. 6F, the update maycause interface 600 to update the entry in listing 606 associated withThreat ID: Threat_3 to reflect the packets received in step 61 and a newscore (e.g., 3) assigned by packet-filtering device 144 to the threatassociated with Threat ID: Threat_3 (e.g., the score may have increasedbased on the packets received in step 61).

At step 67, packet-filtering device 144 may continue processing the logdata generated in step 64. For example, referring to FIG. 5G,packet-filtering device 144 may modify an entry in flow log 504 for thepackets received in step 64 based on the entries generated in packet log502 (e.g., in step 65) for the packets received in step 64, for example,modifying the entry corresponding to Threat ID: Threat_1 (e.g., the timerange and the count of associated packets prevented by packet-filteringdevice 144 from continuing toward their respective destinations).

At step 68, packet-filtering device 144 may utilize flow log 504 togenerate data comprising an update for interface 600 and may communicatethe data to host 110. For example, referring to FIG. 6G, the update maycause interface 600 to update the entry in listing 606 associated withThreat ID: Threat_1 to reflect the packets received in step 64 and a newscore (e.g., 6) assigned by packet-filtering device 144 to the threatassociated with Threat ID: Threat_1 (e.g., the score may have increasedbased on the packets received in step 64).

FIG. 7 depicts an illustrative method for rule-based network-threatdetection in accordance with one or more aspects of the disclosure.Referring to FIG. 7, at step 702, a packet-filtering device may receivea plurality of packet-filtering rules configured to cause thepacket-filtering device to identify packets corresponding to one or morenetwork-threat indicators. For example, packet-filtering device 144 mayreceive packet-filtering rules 404 from rule provider 128. At step 704,the packet-filtering device may receive a packet corresponding to atleast one of the network-threat indicators. For example,packet-filtering device 144 may receive a packet generated by host 112and destined for threat host 136. At step 706, the packet-filteringdevice may determine that the packet corresponds to criteria specifiedby one of the plurality of packet-filtering rules. For example,packet-filtering device 144 may determine that the packet generated byhost 112 and destined for threat host 136 corresponds to Rule: TI003. Atstep 708, the packet-filtering device may apply an operator specified bythe packet-filtering rule to the packet. For example, packet-filteringdevice 144 may apply an operator (e.g., an ALLOW operator) specified byRule: TI003 to the packet generated by host 112 and may allow the packetgenerated by host 112 to continue toward threat host 136.

At step 710, the packet-filtering device may generate a log entrycomprising information from the packet-filtering rule that is distinctfrom the criteria and identifies the one or more network-threatindicators. For example, packet-filtering device 144 may generate anentry in packet log 502 comprising Threat ID: Threat_3 for the packetgenerated by host 112. At step 712, the packet-filtering device maygenerate data indicating whether the packet-filtering device preventedthe packet from continuing toward its destination (e.g., blocked thepacket) or allowed the packet to continue toward its destination. Forexample, packet-filtering device 144 may generate data comprising anupdate for interface 600 that indicates that packet-filtering device 144allowed the packet generated by host 112 to continue toward threat host136. At step 714, the packet-filtering device may communicate the datato a user device. For example, packet-filtering device 144 maycommunicate the data comprising the update for interface 600 to host110. At step 716, the packet-filtering device may indicate in aninterface whether the packet-filtering device prevented the packet fromcontinuing toward its destination or allowed the packet to continuetoward its destination. For example, communicating the data comprisingthe update for interface 600 may cause host 110 to indicate in interface600 that packet-filtering device 144 allowed the packet generated byhost 112 to continue toward threat host 136.

The functions and steps described herein may be embodied incomputer-usable data or computer-executable instructions, such as in oneor more program modules, executed by one or more computers or otherdevices to perform one or more functions described herein. Generally,program modules include routines, programs, objects, components, datastructures, etc. that perform particular tasks or implement particularabstract data types when executed by one or more processors in acomputer or other data-processing device. The computer-executableinstructions may be stored on a computer-readable medium such as a harddisk, optical disk, removable storage media, solid-state memory, RAM,etc. As will be appreciated, the functionality of the program modulesmay be combined or distributed as desired. In addition, thefunctionality may be embodied in whole or in part in firmware orhardware equivalents, such as integrated circuits, application-specificintegrated circuits (ASICs), field-programmable gate arrays (FPGA), andthe like. Particular data structures may be used to more effectivelyimplement one or more aspects of the disclosure, and such datastructures are contemplated to be within the scope ofcomputer-executable instructions and computer-usable data describedherein.

Although not required, one of ordinary skill in the art will appreciatethat various aspects described herein may be embodied as a method,system, apparatus, or one or more computer-readable media storingcomputer-executable instructions. Accordingly, aspects may take the formof an entirely hardware embodiment, an entirely software embodiment, anentirely firmware embodiment, or an embodiment combining software,hardware, and firmware aspects in any combination.

As described herein, the various methods and acts may be operativeacross one or more computing devices and networks. The functionality maybe distributed in any manner or may be located in a single computingdevice (e.g., a server, client computer, or the like).

Aspects of the disclosure have been described in terms of illustrativeembodiments thereof. Numerous other embodiments, modifications, andvariations within the scope and spirit of the appended claims will occurto persons of ordinary skill in the art from a review of thisdisclosure. For example, one of ordinary skill in the art willappreciate that the steps illustrated in the illustrative figures may beperformed in other than the recited order and that one or moreillustrated steps may be optional. Any and all features in the followingclaims may be combined or rearranged in any way possible.

What is claimed is:
 1. A method comprising: receiving, by apacket-filtering device, a plurality of packets; responsive to adetermination by the packet-filtering device that a first packet of theplurality of packets corresponds to one or more packet-filtering rules:applying, by the packet-filtering device and to the first packet, anoperator specified by a corresponding packet-filtering rule andconfigured to cause the packet-filtering device to either prevent thefirst packet from continuing toward a destination of the first packet orallow the first packet to continue toward the destination of the firstpacket; and generating, by the packet-filtering device, a packet logentry comprising at least one threat identifier corresponding to thefirst packet and data indicating whether the packet-filtering deviceprevented the first packet from continuing toward the destination of thefirst packet or allowed the packet to continue toward the destination ofthe first packet; updating, by the packet-filtering device and based onthe packet log entry, a packet flow entry, corresponding to thegenerated packet log entry, of packet flow analysis data for a pluralityof logged packets, wherein the packet flow analysis data comprises datacorresponding to a plurality of packet flow entries, and wherein eachpacket flow entry consolidates a plurality of packet log entriescorresponding to a common threat identifier; communicating, by thepacket-filtering device and to a computing device, the packet flowanalysis data; and causing, based on the communicated packet flowanalysis data, display of at least a portion of the packet flow analysisdata, wherein the packet flow analysis data comprises at least onethreat identifier corresponding to each of the plurality of loggedpackets, packet time data for packets corresponding to the packet flowentry, and data indicating whether the packet-filtering device preventedpackets from continuing toward a respective destination or allowedpackets to continue toward the respective destination.
 2. The method ofclaim 1, wherein each packet log entry further comprises packet timedata, data derived from an associated packet, environmental data of theassociated packet, data identifying a corresponding packet-filteringrule, data indicating an operator applied, and at least onecorresponding threat identifier.
 3. The method of claim 1, wherein thepacket flow analysis data comprises a time range of the plurality ofpacket log entries corresponding to the common threat identifier, andwherein the time range indicates an earliest hit time and a latest timehit.
 4. The method of claim 1, wherein the updating the packet flowentry of the packet flow analysis data for the plurality of loggedpackets further comprises: modifying, for each packet of the pluralityof packets, responsive to a determination that each packet correspondsto one or more packet-filtering rules, and based on the packet logentry, an existing packet flow log entry to indicate one or morecorresponding packet-filtering rules and whether the packet-filteringdevice prevented each packet from continuing toward each packet'srespective destination or allowed each packet to continue toward eachpacket's respective destination.
 5. The method of claim 1, wherein: eachpacket flow entry of the plurality of packet flow entries corresponds toa different threat identifier of a plurality of threat identifiers; andupdating the packet flow entry of the packet flow analysis datacomprises updating a packet flow entry, of the plurality of packet flowentries and based on the packet log entry, of a threat identifier thatcorresponds to the packet log entry.
 6. The method of claim 1, whereinthe packet flow analysis data further comprises one or more scores,wherein each score is associated with a corresponding packet flow entry,the method further comprising: determining the one or more scores basedon a number of packets associated with each packet flow entry and basedon times associated with the packets associated with each packet flowentry; updating the one or more scores based on each packet log entry;and indicating, in the packet flow analysis data, the one or morescores.
 7. The method of claim 6, the method further comprising:updating the one or more scores based on one or more times at which oneor more packets of the plurality of logged packets that corresponds toone or more packet-filtering rules were filtered by the packet-filteringdevice; and updating the one or more scores based on a number of theplurality of logged packets that correspond to the one or morepacket-filtering rules.
 8. The method of claim 6, wherein determiningthe one or more scores further comprises determining the one or morescores based on an identity of one or more network-threat-intelligenceproviders that provided network-threat indicators associated with acorresponding threat identifier, and a number of network-threatintelligence providers that provided network-threat indicatorsassociated with a corresponding threat identifier.
 9. The method ofclaim 6, wherein determining the one or more scores further comprisesdetermining the one or more scores based on a destination of a packet ofthe plurality of logged packets that corresponds to the one or morepacket-filtering rules.
 10. The method of claim 6, wherein determiningthe one or more scores further comprises determining the one or morescores based on at least one of a type of threat associated with apacket flow entry threat indicator, geographic information, an anonymousproxy associated with the packet flow entry threat indicator, or anactor associated with the packet flow entry threat indicator.
 11. Apacket-filtering device comprising: at least one processor; and memorystoring instructions that when executed by the at least one processorcause the packet-filtering device to: receive a plurality of packets;responsive to a determination by the packet-filtering device that afirst packet of the plurality of packets corresponds to one or morepacket-filtering rules: apply, to the first packet, an operatorspecified by a corresponding packet-filtering rule and configured tocause the packet-filtering device to either prevent the first packetfrom continuing toward a destination of the first packet or allow thefirst packet to continue toward the destination of the first packet; andgenerate a packet log entry comprising at least one threat indicatorcorresponding to the first packet and data indicating whether thepacket-filtering device prevented the first packet from continuingtoward the destination of the first packet or allowed the packet tocontinue toward the destination of the first packet; update, based onthe packet log entry, a packet flow entry, corresponding to thegenerated packet log entry, of packet flow analysis data for a pluralityof logged packets, wherein the packet flow analysis data comprises datacorresponding to a plurality of packet flow entries, and wherein eachpacket flow entry consolidates a plurality of packet log entriescorresponding to a common threat identifier; communicate, to a computingdevice, the packet flow analysis data; and cause, based on thecommunicated packet flow analysis data, display of at least a portion ofthe packet flow analysis data, wherein the packet flow analysis datacomprises at least one threat identifier corresponding to each of theplurality of logged packets, packet time data for packets correspondingto the packet flow entry, and data indicating whether thepacket-filtering device prevented packets from continuing toward arespective destination or allowed packets to continue toward therespective destination.
 12. The packet-filtering device of claim 11,wherein each packet log entry further comprises packet time data, dataderived from an associated packet, environmental data of the associatedpacket, data identifying a corresponding packet-filtering rule, dataindicating an operator applied, and at least one corresponding threatidentifier.
 13. The packet-filtering device of claim 11, wherein thepacket flow analysis data comprises a time range of the plurality ofpacket log entries corresponding to the common threat identifier, andwherein time range indicates an earliest hit time and a latest time hit.14. The packet-filtering device of claim 11, wherein the instructionsthat when executed by the at least one processor further cause thepacket-filtering device to update the packet flow entry of the packetflow analysis data for the plurality of logged packets furthercomprising instructions that when executed by the at least one processorfurther cause the packet-filtering device to modify, for each packet ofthe plurality of logged packets, responsive to a determination that eachpacket corresponds to the one or more packet-filtering rules, and basedon the packet log entry, an existing packet flow log entry to indicatethe one or more corresponding packet-filtering rules and whether thepacket-filtering device prevented each packet from continuing towardeach packet's respective destination or allowed each packet to continuetoward each packet's respective destination.
 15. The packet-filteringdevice of claim 11, wherein: each packet flow entry of the plurality ofpacket flow entries corresponds to a different threat identifier of aplurality of threat identifiers; and the update of the packet flow entryof the packet flow analysis data further comprises updating a packetflow entry, of the plurality of packet flow entries and based on thepacket log entry, of a threat identifier that corresponds to the packetlog entry.
 16. The packet-filtering device of claim 11, wherein thepacket flow analysis data further comprises one or more scores, whereineach score is associated with a corresponding packet flow entry, thememory storing instructions that when executed by the at least oneprocessor further cause the packet-filtering device to: determine theone or more scores based on a number of packets associated with eachpacket flow entry and based on times associated with the packetsassociated with each packet flow entry; update the one or more scoresbased on each packet log entry; and indicate, in the packet flowanalysis data, the one or more scores.
 17. The packet-filtering deviceof claim 16, wherein the instructions that when executed by the at leastone processor further cause the packet-filtering device to: update theone or more scores based on one or more times at which one or morepackets of the plurality of logged packets that correspond to the one ormore packet-filtering rules were filtered by the packet-filteringdevice; and update the one or more scores based on a number of theplurality of logged packets that correspond to the one or morepacket-filtering rules.
 18. The packet-filtering device of claim 16,wherein the instructions that when executed by the at least oneprocessor further cause the packet-filtering device to determine the oneor more scores further comprise instructions that when executed by theat least one processor further cause the packet-filtering device todetermine the one or more scores based on an identity of one or morenetwork-threat-intelligence providers that provided network-threatindicators associated with a corresponding threat identifier, and anumber of network-threat intelligence providers that providednetwork-threat indicators associated with a corresponding threatidentifier.
 19. The packet-filtering device of claim 16, wherein theinstructions that when executed by the at least one processor furthercause the packet-filtering device to determine the one or more scoresfurther comprise instructions that when executed by the at least oneprocessor further cause the packet-filtering device to determine the oneor more scores based on a destination of a packet of the plurality oflogged packets that corresponds to the one or more packet-filteringrules.
 20. One or more non-transitory computer-readable media comprisinginstructions that when executed by at least one processor of apacket-filtering device cause the packet-filtering device to: receive aplurality of packets; responsive to a determination by thepacket-filtering device that a first packet of the plurality of packetscorresponds to one or more packet-filtering rules: apply, to the firstpacket, an operator specified by a corresponding packet-filtering ruleand configured to cause the packet-filtering device to either preventthe first packet from continuing toward a destination of the firstpacket or allow the first packet to continue toward the destination ofthe first packet; and generate a packet log entry comprising at leastone threat indicator corresponding to the first packet and dataindicating whether the packet-filtering device prevented the firstpacket from continuing toward the destination of the first packet orallowed the packet to continue toward the destination of the firstpacket; update, based on the packet log entry, a packet flow entry,corresponding to the generated packet log entry, of packet flow analysisdata for a plurality of logged packets, wherein the packet flow analysisdata comprises data corresponding to a plurality of packet flow entries,and wherein each packet flow entry consolidates a plurality of packetlog entries corresponding to a common threat identifier; communicate, toa computing device, the packet flow analysis data; and cause, based onthe communicated packet flow analysis data, display of at least aportion of the packet flow analysis data, wherein the packet flowanalysis data comprises at least one threat identifier corresponding toeach of the plurality of logged packets, packet time data for packetscorresponding to the packet flow entry, and data indicating whether thepacket-filtering device prevented packets from continuing toward arespective destination or allowed packets to continue toward therespective destination.