Distributed Denial-of-Service Open Threat Signaling (DOTS) Telemetry Specifications

Document Type Expired Internet-Draft (individual)
Authors Ehud Doron , Tirumaleswar Reddy.K  , Flemming Andreasen  , Liang Xia  , Kaname Nishizuka 
Last updated 2017-05-03 (latest revision 2016-10-30)
Stream (None)
Intended RFC status (None)
Expired & archived
pdf htmlized bibtex
Stream Stream state (No stream defined)
Consensus Boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Expired
Telechat date
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at


This document aims to enrich DOTS Signaling with various telemetry attributes allowing optimal DDoS/DoS attack mitigation. The nature of the DOTS architecture is to allow DOTS Agents to be integrated in highly diverse environments. Therefore, the DOTS architecture imposes a significant challenge in delivering optimal mitigation services. The DOTS Telemetry covered in this document aims to provide all needed attributes and feedback signaled from DOTS Agents such that optimal mitigation services can be delivered based on DOTS Signaling.


Ehud Doron (ehudd@radware.com)
Tirumaleswar Reddy.K (tireddy@cisco.com)
Flemming Andreasen (fandreas@cisco.com)
Liang Xia (frank.xialiang@huawei.com)
Kaname Nishizuka (kaname@nttv6.jp)

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)