Distributed Denial-of-Service Open Threat Signaling (DOTS) Signal Channel Call Home
draft-reddy-dots-home-network-04

Document Type Replaced Internet-Draft (individual)
Last updated 2019-04-01
Replaced by draft-ietf-dots-signal-call-home
Stream (None)
Intended RFC status (None)
Formats
Expired & archived
pdf htmlized bibtex
Yang Validation 0 errors, 0 warnings.
Additional URLs
- Yang catalog entry for ietf-dots-call-home@2018-04-01.yang
- Yang impact analysis for draft-reddy-dots-home-network
Stream Stream state (No stream defined)
Consensus Boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Replaced by draft-ietf-dots-signal-call-home
Telechat date
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at
https://www.ietf.org/archive/id/draft-reddy-dots-home-network-04.txt

Abstract

This document presents DOTS signal channel Call Home service, which enables a DOTS server to initiate a secure connection to a DOTS client, and to receive the attack traffic information from the DOTS client. The DOTS server in turn uses the attack traffic information to identify the compromised devices launching the outgoing DDoS attack and takes appropriate mitigation action. The Call Home service is not specific to the home networks; the solution targets any deployment which requires to block DDoS attack traffic closer to the source(s) of a DDoS attack.

Authors

Reddy K (kondtir@gmail.com)
Mohamed Boucadair (mohamed.boucadair@orange.com)
Jon Shallow (supjps-ietf@jpshallow.com)

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)