Distributed Denial-of-Service Open Threat Signaling (DOTS) Telemetry
draft-reddy-dots-telemetry-04
Document | Type |
Replaced Internet-Draft
(dots WG)
Expired & archived
|
|
---|---|---|---|
Authors | Tirumaleswar Reddy.K , Mohamed Boucadair , Ehud Doron, Meiling Chen | ||
Last updated | 2019-12-17 (Latest revision 2019-10-18) | ||
Replaced by | draft-ietf-dots-telemetry | ||
RFC stream | Internet Engineering Task Force (IETF) | ||
Intended RFC status | (None) | ||
Formats | |||
Yang Validation | ☯ 0 errors, 0 warnings | ||
Additional resources |
Yang catalog entry for ietf-dots-telemetry@2019-10-14.yang
Yang impact analysis for draft-reddy-dots-telemetry Mailing list discussion |
||
Stream | WG state | Adopted by a WG | |
Document shepherd | (None) | ||
IESG | IESG state | Replaced by draft-ietf-dots-telemetry | |
Consensus boilerplate | Unknown | ||
Telechat date | (None) | ||
Responsible AD | (None) | ||
Send notices to | (None) |
This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:
Abstract
This document aims to enrich DOTS signal channel protocol with various telemetry attributes allowing optimal DDoS attack mitigation. This document specifies the normal traffic baseline and attack traffic telemetry attributes a DOTS client can convey to its DOTS server in the mitigation request, the mitigation status telemetry attributes a DOTS server can communicate to a DOTS client, and the mitigation efficacy telemetry attributes a DOTS client can communicate to a DOTS server. The telemetry attributes can assist the mitigator to choose the DDoS mitigation techniques and perform optimal DDoS attack mitigation.
Authors
Tirumaleswar Reddy.K
Mohamed Boucadair
Ehud Doron
Meiling Chen
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)