Distributed-Denial-of-Service Open Threat Signaling (DOTS) Server Discovery
draft-boucadair-dots-server-discovery-05
Document | Type |
Replaced Internet-Draft
(candidate for dots WG)
Expired & archived
|
|
---|---|---|---|
Authors | Mohamed Boucadair , Tirumaleswar Reddy.K , Prashanth Patil | ||
Last updated | 2018-11-30 (Latest revision 2018-10-07) | ||
Replaces | draft-boucadair-dots-dhcp | ||
Replaced by | draft-ietf-dots-server-discovery | ||
RFC stream | Internet Engineering Task Force (IETF) | ||
Intended RFC status | (None) | ||
Formats | |||
Additional resources | Mailing list discussion | ||
Stream | WG state | Call For Adoption By WG Issued | |
Document shepherd | (None) | ||
IESG | IESG state | Replaced by draft-ietf-dots-server-discovery | |
Consensus boilerplate | Unknown | ||
Telechat date | (None) | ||
Responsible AD | (None) | ||
Send notices to | (None) |
This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:
Abstract
It may not be possible for a network to determine the cause for an attack, but instead just realize that some resources seem to be under attack. To fill that gap, Distributed-Denial-of-Service Open Threat Signaling (DOTS) allows a network to inform a DOTS server that it is under a potential attack so that appropriate mitigation actions are undertaken. This document specifies mechanisms to configure nodes with DOTS servers.
Authors
Mohamed Boucadair
Tirumaleswar Reddy.K
Prashanth Patil
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)