2015-05-30 21:53:28 +02:00
|
|
|
Source: fastnetmon
|
|
|
|
Maintainer: Pavel Odintsov <pavel.odintsov@gmail.com>
|
2017-07-27 11:45:27 +02:00
|
|
|
Section: net
|
2015-05-30 21:53:28 +02:00
|
|
|
Priority: optional
|
2015-06-02 18:38:28 +02:00
|
|
|
Standards-Version: 3.9.6
|
2015-06-04 23:07:40 +02:00
|
|
|
# debhelper 8 - squeeze, 9 - wheezy/jessie
|
2015-06-05 11:35:22 +02:00
|
|
|
Build-Depends: debhelper (>= 8), cmake, libboost-thread-dev, libboost-system-dev, libboost-regex-dev, libpcap-dev, liblog4cpp5-dev, libboost-all-dev, libgpm-dev, libncurses5-dev, libgeoip-dev, clang, cmake
|
2015-05-30 21:53:28 +02:00
|
|
|
|
|
|
|
Package: fastnetmon
|
|
|
|
Architecture: any
|
2015-06-05 11:35:22 +02:00
|
|
|
Depends: ${shlibs:Depends}, ${misc:Depends}, libboost-thread-dev, libboost-system-dev, libboost-regex-dev, libpcap-dev, liblog4cpp5-dev
|
2015-06-02 18:26:58 +02:00
|
|
|
Description: Very fast DDoS analyzer with sflow/netflow/mirror support
|
2017-07-27 11:44:35 +02:00
|
|
|
FastNetMon is a very high performance distributed denial-of-service attack
|
|
|
|
(DDoS attack) detector built on top of multiple packet capture engines:
|
|
|
|
NetFlow, IPFIX, sFLOW.
|
|
|
|
.
|
|
|
|
It can detect hosts in your networks sending or receiving large volumes of
|
|
|
|
packets/bytes/flows per second. It can call an external script to notify you,
|
|
|
|
switch off a server, or blackhole the client.
|
|
|
|
.
|
|
|
|
To enable sFLOW, simply specify IP of the server running FastNetMon and specify
|
|
|
|
(configurable) port 6343. To enable netflow, simply specify IP of the server
|
|
|
|
running FastNetMon and specify (configurable) port 2055.
|