Skip to main content

Information Model for DDoS Open Threat Signaling (DOTS)
draft-reddy-dots-info-model-00

Document Type Expired Internet-Draft (individual)
Expired & archived
Authors Tirumaleswar Reddy.K , Prashanth Patil , Mike Geller , Dan Wing , Sandeep Rao , Mohamed Boucadair
Last updated 2015-12-31 (Latest revision 2015-06-29)
RFC stream (None)
Intended RFC status (None)
Formats
Stream Stream state (No stream defined)
Consensus boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Expired
Telechat date (None)
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:

Abstract

This document discusses the need and the mechanisms to dynamically update configuration of network monitoring devices to help identify distributed denial-of-service (DDoS) attacks in a network. Once an attack is signalled by a client or detected locally, provisioning cycles are triggered to program a set of network elements to undertake appropriate actions (including, blackhole, drop, rate- limit, or add to watch list) on the suspect traffic.

Authors

Tirumaleswar Reddy.K
Prashanth Patil
Mike Geller
Dan Wing
Sandeep Rao
Mohamed Boucadair

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)