Bug#396618: ITP: dns-flood-detector -- DNS Flood Detector was developed to detect abusive usage levels on high traffic nameservers and to enable quick response in halting the use of one's nameserver to facilitate spam.
Package: wnpp
Severity: wishlist
Owner: Jan Wagner <waja@cyconet.org>
* Package name : dns-flood-detector
Version : 1.12
Upstream Author : Dennis Opacki <dopacki@adotout.com>
* URL : http://www.adotout.com/
* License : GPL 2
Programming Lang: C
Description : DNS Flood Detector was developed to detect abusive usage levels on high traffic nameservers and to enable quick response in halting the use of one's nameserver to facilitate spam.
DNS Flood Detector uses libpcap (in non-promiscuous mode) to monitor incoming dns queries to a nameserver. The tool may be run in one
of two modes, either daemon mode or "bindsnap" mode. In daemon mode, the tool will alarm via syslog. In bindsnap mode, the user is
able to get near-real-time stats on usage to aid in more detailed troubleshooting.
-- System Information:
Debian Release: testing/unstable
APT prefers testing
APT policy: (500, 'testing')
Architecture: i386 (i686)
Shell: /bin/sh linked to /bin/bash
Kernel: Linux 2.6.17-2-686
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)
Reply to: