Distributed Denial-of-Service Open Threat Signaling (DOTS) Telemetry Specifications
draft-doron-dots-telemetry-00
Document | Type |
Expired Internet-Draft
(individual)
Expired & archived
|
|
---|---|---|---|
Authors | Ehud Doron, Tirumaleswar Reddy.K , Flemming Andreasen , Liang Xia , Kaname Nishizuka | ||
Last updated | 2017-05-03 (Latest revision 2016-10-30) | ||
RFC stream | (None) | ||
Intended RFC status | (None) | ||
Formats | |||
Stream | Stream state | (No stream defined) | |
Associated None milestone |
|
||
Consensus boilerplate | Unknown | ||
RFC Editor Note | (None) | ||
IESG | IESG state | Expired | |
Telechat date | (None) | ||
Responsible AD | (None) | ||
Send notices to | (None) |
This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:
Abstract
This document aims to enrich DOTS Signaling with various telemetry attributes allowing optimal DDoS/DoS attack mitigation. The nature of the DOTS architecture is to allow DOTS Agents to be integrated in highly diverse environments. Therefore, the DOTS architecture imposes a significant challenge in delivering optimal mitigation services. The DOTS Telemetry covered in this document aims to provide all needed attributes and feedback signaled from DOTS Agents such that optimal mitigation services can be delivered based on DOTS Signaling.
Authors
Ehud Doron
Tirumaleswar Reddy.K
Flemming Andreasen
Liang Xia
Kaname Nishizuka
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)