Skip to main content

Distributed Denial-of-Service Open Threat Signaling (DOTS) Telemetry Specifications

Document Type Expired Internet-Draft (individual)
Expired & archived
Authors Ehud Doron, Tirumaleswar Reddy.K , Flemming Andreasen , Liang Xia , Kaname Nishizuka
Last updated 2017-05-03 (Latest revision 2016-10-30)
RFC stream (None)
Intended RFC status (None)
Stream Stream state (No stream defined)
Associated None milestone
Sep 2020
DOTS Telemetry draft to WGLC
Consensus boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Expired
Telechat date (None)
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:


This document aims to enrich DOTS Signaling with various telemetry attributes allowing optimal DDoS/DoS attack mitigation. The nature of the DOTS architecture is to allow DOTS Agents to be integrated in highly diverse environments. Therefore, the DOTS architecture imposes a significant challenge in delivering optimal mitigation services. The DOTS Telemetry covered in this document aims to provide all needed attributes and feedback signaled from DOTS Agents such that optimal mitigation services can be delivered based on DOTS Signaling.


Ehud Doron
Tirumaleswar Reddy.K
Flemming Andreasen
Liang Xia
Kaname Nishizuka

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)