Distributed Denial-of-Service Open Threat Signaling (DOTS) Telemetry Specifications
draft-doron-dots-telemetry-00

Document Type Expired Internet-Draft (individual)
Last updated 2017-05-03 (latest revision 2016-10-30)
Stream (None)
Intended RFC status (None)
Formats
Expired & archived
plain text pdf html bibtex
Stream Stream state (No stream defined)
Consensus Boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Expired
Telechat date
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at
https://www.ietf.org/archive/id/draft-doron-dots-telemetry-00.txt

Abstract

This document aims to enrich DOTS Signaling with various telemetry attributes allowing optimal DDoS/DoS attack mitigation. The nature of the DOTS architecture is to allow DOTS Agents to be integrated in highly diverse environments. Therefore, the DOTS architecture imposes a significant challenge in delivering optimal mitigation services. The DOTS Telemetry covered in this document aims to provide all needed attributes and feedback signaled from DOTS Agents such that optimal mitigation services can be delivered based on DOTS Signaling.

Authors

Ehud Doron (ehudd@radware.com)
Tirumaleswar Reddy (tireddy@cisco.com)
Flemming Andreasen (fandreas@cisco.com)
Liang Xia (frank.xialiang@huawei.com)
Kaname Nishizuka (kaname@nttv6.jp)

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)