Distributed Denial-of-Service Open Threat Signaling (DOTS) Telemetry
draft-reddy-dots-telemetry-04

Document Type Replaced Internet-Draft (dots WG)
Last updated 2019-12-17 (latest revision 2019-10-18)
Replaced by draft-ietf-dots-telemetry
Stream IETF
Intended RFC status (None)
Formats
Expired & archived
pdf htmlized bibtex
Yang Validation 0 errors, 0 warnings.
Additional URLs
- Yang catalog entry for ietf-dots-telemetry@2019-10-14.yang
- Yang impact analysis for draft-reddy-dots-telemetry
- Mailing list discussion
Stream WG state Adopted by a WG
Document shepherd No shepherd assigned
IESG IESG state Replaced by draft-ietf-dots-telemetry
Consensus Boilerplate Unknown
Telechat date
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at
https://www.ietf.org/archive/id/draft-reddy-dots-telemetry-04.txt

Abstract

This document aims to enrich DOTS signal channel protocol with various telemetry attributes allowing optimal DDoS attack mitigation. This document specifies the normal traffic baseline and attack traffic telemetry attributes a DOTS client can convey to its DOTS server in the mitigation request, the mitigation status telemetry attributes a DOTS server can communicate to a DOTS client, and the mitigation efficacy telemetry attributes a DOTS client can communicate to a DOTS server. The telemetry attributes can assist the mitigator to choose the DDoS mitigation techniques and perform optimal DDoS attack mitigation.

Authors

Tirumaleswar Reddy.K (kondtir@gmail.com)
Mohamed Boucadair (mohamed.boucadair@orange.com)
Ehud Doron (ehudd@radware.com)
chenmeiling (chenmeiling@chinamobile.com)

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)