Skip to main content
Version: Next

Outbound Mail Spammers Monitor (10025 / 20025)

Description

This Module detects internal hosts infected with spam malware. It monitors egress traffic over TCP protocol and destination ports 25 or 465, excluding known authorized mail servers. This Module reports top email senders and provides consolidated information over a time interval.

Parameters

Parameter NameDescriptionComments
Data Collection Interval, secModule logic execution intervalmin = 10 sec, max = 3600 sec, default = 600 sec
N - number of reported outbound spammersTop N (number of reported spammers)min = 0, max = 100000, default = 50 (0 indicates all hosts are reported)
Known local mail servers (ipv4_src_addr) listList of IP addresses of known mail servers to be excluded from reporting

Input

NetFlow v5, v9, IPFIX, Cisco ASA NSEL, Palo Alto Networks NetFlow v9, sFlow.

Required NetFlow fields

Information Element (IE)IE idIE size, BDescription
sourceIPv4Address84The IPv4 source address in the IP packet header
protocolIdentifier41The value of the protocol number in the IP packet header. The protocol number identifies the IP packet payload type. Protocol numbers are defined in the IANA Protocol Numbers registry.
destinationTransportPort112The destination port identifier in the transport header. For the transport protocols UDP, TCP, and SCTP, this is the destination port number given in the respective header.
octetDeltaCount14 or 8The number of octets since the previous report (if any) in incoming packets for this Flow at the Observation Point. The number of octets includes IP header(s) and IP payload.
packetDeltaCount24 or 8The number of incoming packets since the previous report (if any) for this Flow at the Observation Point.

Syslog/JSON Message Fields

KeyField DescriptionComments
nfc_idMessage type identifier"nfc_id=20025"
exp_ipNetFlow exporter IPv4 address<IPv4_address>
src_ipSource host IPv4 address<IPv4_address>
bytes_outBytes total (Traffic)<number>
packets_outPackets<number>
num_connNumber of flows initiated by the source host<number>
min_bytesMinimum bytes count of flows<number>
max_bytesMaximum bytes count of flows<number>
t_intObservation time interval, msec<number>