Skip to main content

Distributed-Denial-of-Service Open Threat Signaling (DOTS) Server Discovery
draft-boucadair-dots-server-discovery-05

Document Type Replaced Internet-Draft (candidate for dots WG)
Expired & archived
Authors Mohamed Boucadair , Tirumaleswar Reddy.K , Prashanth Patil
Last updated 2018-11-30 (Latest revision 2018-10-07)
Replaces draft-boucadair-dots-dhcp
Replaced by draft-ietf-dots-server-discovery
RFC stream Internet Engineering Task Force (IETF)
Intended RFC status (None)
Formats
Additional resources Mailing list discussion
Stream WG state Call For Adoption By WG Issued
Document shepherd (None)
IESG IESG state Replaced by draft-ietf-dots-server-discovery
Consensus boilerplate Unknown
Telechat date (None)
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:

Abstract

It may not be possible for a network to determine the cause for an attack, but instead just realize that some resources seem to be under attack. To fill that gap, Distributed-Denial-of-Service Open Threat Signaling (DOTS) allows a network to inform a DOTS server that it is under a potential attack so that appropriate mitigation actions are undertaken. This document specifies mechanisms to configure nodes with DOTS servers.

Authors

Mohamed Boucadair
Tirumaleswar Reddy.K
Prashanth Patil

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)