@techreport{ietf-dots-telemetry-use-cases-10, number = {draft-ietf-dots-telemetry-use-cases-10}, type = {Internet-Draft}, institution = {Internet Engineering Task Force}, publisher = {Internet Engineering Task Force}, note = {Work in Progress}, url = {https://datatracker.ietf.org/doc/html/draft-ietf-dots-telemetry-use-cases-10}, author = {Yuhei Hayashi and chenmeiling and Li Su}, title = {{Use Cases for DDoS Open Threat Signaling (DOTS) Telemetry}}, pagetotal = 28, year = 2022, month = apr, day = 1, abstract = {DDoS Open Threat Signaling (DOTS) Telemetry enriches the base DOTS protocols to assist the mitigator in using efficient DDoS attack mitigation techniques in a network. This document presents sample use cases for DOTS Telemetry. It discusses in particular what components are deployed in the network, how they cooperate, and what information is exchanged to effectively use these techniques.}, }