Distributed Denial-of-Service Open Threat Signaling (DOTS) Telemetry

Document Type Replaced Internet-Draft (dots WG)
Authors Tirumaleswar Reddy.K  , Mohamed Boucadair  , Ehud Doron , chenmeiling 
Last updated 2019-12-17 (latest revision 2019-10-18)
Replaced by draft-ietf-dots-telemetry
Stream Internet Engineering Task Force (IETF)
Intended RFC status (None)
Expired & archived
plain text xml pdf htmlized bibtex
Yang Validation 0 errors, 0 warnings.
Additional Resources
- Yang catalog entry for ietf-dots-telemetry@2019-10-14.yang
- Yang impact analysis for draft-reddy-dots-telemetry
- Mailing list discussion
Stream WG state Adopted by a WG
Document shepherd No shepherd assigned
IESG IESG state Replaced by draft-ietf-dots-telemetry
Consensus Boilerplate Unknown
Telechat date
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at


This document aims to enrich DOTS signal channel protocol with various telemetry attributes allowing optimal DDoS attack mitigation. This document specifies the normal traffic baseline and attack traffic telemetry attributes a DOTS client can convey to its DOTS server in the mitigation request, the mitigation status telemetry attributes a DOTS server can communicate to a DOTS client, and the mitigation efficacy telemetry attributes a DOTS client can communicate to a DOTS server. The telemetry attributes can assist the mitigator to choose the DDoS mitigation techniques and perform optimal DDoS attack mitigation.


Tirumaleswar Reddy.K (kondtir@gmail.com)
Mohamed Boucadair (mohamed.boucadair@orange.com)
Ehud Doron (ehudd@radware.com)
chenmeiling (chenmeiling@chinamobile.com)

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)