Skip to main content

Distributed Denial-of-Service Open Threat Signaling (DOTS) Signal Channel Call Home

Document Type Replaced Internet-Draft (individual)
Expired & archived
Authors Tirumaleswar Reddy.K , Mohamed Boucadair , Jon Shallow
Last updated 2019-04-01
Replaced by RFC 9066
RFC stream (None)
Intended RFC status (None)
Yang Validation 0 errors, 0 warnings
Additional resources Yang catalog entry for ietf-dots-call-home@2018-04-01.yang
Yang impact analysis for draft-reddy-dots-home-network
Stream Stream state (No stream defined)
Consensus boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Replaced by draft-ietf-dots-signal-call-home
Telechat date (None)
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:


This document presents DOTS signal channel Call Home service, which enables a DOTS server to initiate a secure connection to a DOTS client, and to receive the attack traffic information from the DOTS client. The DOTS server in turn uses the attack traffic information to identify the compromised devices launching the outgoing DDoS attack and takes appropriate mitigation action. The Call Home service is not specific to the home networks; the solution targets any deployment which requires to block DDoS attack traffic closer to the source(s) of a DDoS attack.


Tirumaleswar Reddy.K
Mohamed Boucadair
Jon Shallow

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)