<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.17 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-cui-savnet-anti-ddos-00" category="info" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.14.2 -->
  <front>
    <title abbrev="SADA">SAVA-based Anti-DDoS Architecture</title>
    <seriesInfo name="Internet-Draft" value="draft-cui-savnet-anti-ddos-00"/>
    <author initials="Y." surname="Cui" fullname="Yong Cui">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <region>Beijing</region>
          <code>100084</code>
          <country>China</country>
        </postal>
        <email>cuiyong@tsinghua.edu.cn</email>
        <uri>http://www.cuiyong.net/</uri>
      </address>
    </author>
    <author initials="J." surname="Wu" fullname="Jianping Wu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <region>Beijing</region>
          <code>100084</code>
          <country>China</country>
        </postal>
        <email>jianping@cernet.edu.cn</email>
      </address>
    </author>
    <author initials="L." surname="Hui" fullname="Linbo Hui">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <region>Beijing</region>
          <code>100094</code>
          <country>China</country>
        </postal>
        <email>huilb@zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="L." surname="Zhang" fullname="Lei Zhang">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <region>Beijing</region>
          <code>100094</code>
          <country>China</country>
        </postal>
        <email>zhanglei@zgclab.edu.cn</email>
      </address>
    </author>
    <date year="2022" month="September" day="13"/>
    <area>Routing</area>
    <workgroup>SAVNET Working Group</workgroup>
    <keyword>Source Address Validation</keyword>
    <keyword>DDoS Detection, Mitigation, and Traceback</keyword>
    <abstract>
      <t>This document proposes the SAVA-based Anti-DDoS Architecture (SADA), which can efficiently detect, mitigate, and traceback Denial-of-Service (DDoS) attacks that spoof source addresses.
The SADA consists of a distributed DDoS detection mechanism based on honeynets, a multi-stage DDoS mitigation mechanism, and a suspect-based DDoS traceback mechanism.
By adopting the Source Address Validation Architecture (SAVA)  of SAVNET and introducing the data plane and the control plane, the SADA makes minor changes to the SAVA while providing major benefits.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>DDoS attacks using spoofing addresses are notorious on the Internet. 
The attackers command a large number of zombie hosts to forge the target's address and send bogus requests, after which the servers respond with magnified datagrams to the target, resulting in an amplification DDoS attacks.
Some other DDoS attacks (e.g., TCP SYN Flooding Attacks <xref target="RFC4987"/>) also forge source IP addresses in order to drain the target's resources.
These DDoS attacks are simple to carry out but can inflict significant damage.
Their attack traffic is widely dispersed and similar to normal traffic, leading challenge to detect and mitigate.
Furthermore, the spoofed addresses serve as a mask for the attackers, making it difficult to traceback the attackers.</t>
      <t>Some Source Address Validation (SAV) techniques have been proposed to defend against DDoS attacks.
The current practice for achieving ingress filtering is uRPF <xref target="RFC3704"/>, which includes strict uRPF and loose uRPF.
Unfortunately, the strict uRPF often improperly blocks legitimate traffic under asymmetric routing, and the loose uRPF generally permits all received packets.
EFP-uRPF <xref target="RFC8704"/> makes the uRPF more flexible about directionality, while there are mechanisms that <bcp14>MAY</bcp14> lead to improper permit or improper block problems in specific scenarios.
The SAVNET Working Group <xref target="SAVNET_WG"/> provides SAV techniques for intra-domain and inter-domain networks to resolve the problems raised above.
It has been deployed for experimental practice <xref target="RFC5210"/> and is promising to solve the SAV problem.</t>
      <t>However, these SAV techniques are still a long way from being able to defend against DDoS attacks.
First, they only discard spoofing packets at local devices, lacking coordination to detect DDoS attacks with a global view.
Second, only when these SAV techniques are widely deployed will they be able to eliminate DDoS attacks using spoofing addresses, which will take a long time.
Third, there are limited incentives exist to encourage Internet Service Providers (ISPs) to widely deploy SAV devices.</t>
      <t>In the above context, this document offers a SAVA-based Anti-DDoS Architecture (SADA) that incorporates the following advances.</t>
      <ul spacing="normal">
        <li>A distributed DDoS detection mechanism based on honeynets. The SADA introduces a SAV controller for gathering spoofing statistics from SAV routers that act as honeynets.
The SADA can detect DDoS attacks with a comprehensive analysis using aggregated information from distributed SAV routers.</li>
        <li>A multi-stage DDoS mitigation mechanism. By overviewing the DDoS attack with a comprehensive view, the mitigation policies can be deployed at multiple stages (i.e., near-source, middle, and near-target). These policies vary at different locations and can efficiently mitigate the attack.</li>
        <li>A suspect-based DDoS traceback mechanism. The SADA requires SAV routers to monitor the communication logs of suspicious hosts that have ever forged addresses.
The communication logs will be analyzed to find the attackers.</li>
      </ul>
      <t>The SADA can provide considerable advantages for DDoS attacks by fully adopting SAVA features with only minor changes.
Even with a small number of SAV routers deployed, the SADA can deliver accurate DDoS detections across a larger area.
As long as the attack traffic flows through the SAV domain, the SADA is able to mitigate it.
With the aggregated communication logs of suspicious hosts, the SADA can also assist in tracing back the attacker.
In addition, the SADA will provide a spoofing address database and a DDoS attacks database, both of which will be available for SAV domains and other domains.
The above incentives <bcp14>MAY</bcp14> induce ISPs to widely deploy SAV devices, which will, in turn, stimulate a more valuable SADA system.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <ul spacing="normal">
          <li>SADA: the SAVA-based Anti-DDoS Architecture.</li>
          <li>SAV router: a router that can validate source addresses, make statistics of suspicious hosts, and execute filtering policies.</li>
          <li>SAV controller: a server that communicates with SAV routers. It can detect, mitigate, and traceback DDoS attacks.</li>
          <li>SAV device: either a SAV router or a SAV controller.</li>
          <li>SAV domain: a network domain that has SAV routers deployed.</li>
          <li>suspect: a host that ever forged source addresses in the past is considered a suspect, also called a suspicious host.</li>
          <li>honeynet: consists of SAV routers that record the spoofing packets' statistics instead of always blocking them.</li>
        </ul>
      </section>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <!-- # Body [REPLACE] -->

</section>
    </section>
    <section anchor="architecture">
      <name>Architecture</name>
      <artwork><![CDATA[
+---------------------------------------------------------------+
|                Control Plane (SAV controller)                 |
+---------------------------------------------------------------+
|  +-------------+       +-------------+       +-------------+  |
|  |  Detection  |       | Mitigation  |       |  Traceback  |  |
|  +-------------+       +-------------+       +-------------+  |
|  +--------------------+     +------------------+              |
|  | Spoofing Addresses |     |   DDoS Attack    |              |
|  | Database           |     |   Database       |     ...      |
|  +--------------------+     +------------------+              |
+---------------^-------------------------------+---------------+
                |                               |
     Northbound |                               | Southbound
     Interface  |                               | Interface
                |                               |
+---------------+-------------------------------v---------------+
|                  Data Plane (SAV routers)                     |
+---------------------------------------------------------------+
|  +-------------+    +-------------+    +-------------+        |
|  | Monitoring  |    | Measurement |    |  Filtering  |  ...   |
|  +-------------+    +-------------+    +-------------+        |
+---------------------------------------------------------------+

    Figure 1: The SAVA-based Anti-DDoS Architecture
]]></artwork>
      <t>The proposed SADA is shown in Figure 1.
The SADA consists of the data plane and the control plane, where the primary functions of the data plane are monitoring, measurement, and filtering, and the primary functions of the control plane are detecting the attacks, formulating defense strategies, and tracing back the attacks.
The northbound interface is used to send statistics data to the control plane, and the southbound interface is used to receive defense strategies from the control plane. 
The two planes communicate with each other and work together to defend against DDoS attacks.</t>
      <section anchor="distributed-ddos-detection-mechanism-based-on-honeynets">
        <name>Distributed DDoS Detection Mechanism Based on Honeynets</name>
        <t>The data plane reflects the widely distributed SAV routers that serve as the architecture's foundation.
When detecting packets using spoofed addresses, the SAV routers do not simply block them but record their statistics and behaviors, which is regarded as a honeynet.
The SAV routers need periodically transmit the statistics data to the SAVA controller.</t>
        <t>Based on the statistics data aggregated from the data plane, the control plane determines whether there is an ongoing DDoS attack.
The judgment <bcp14>MAY</bcp14> refer to the traffic volume, the number of distinct addresses, the protocol, and the port numbers.
A convincing judgment results include factors such as the ongoing traffic volume, impacted scope, duration time, and so on.</t>
      </section>
      <section anchor="multi-stage-ddos-mitigation-mechanism">
        <name>Multi-stage DDoS Mitigation Mechanism</name>
        <t>The control plane represents the SAV controller, which is the core of the architecture.
With the detailed judgment results, the control plane then formulates mitigation strategies for multiple stages.
From the spatial perspective, the attack traffic can be divided into three stages of near-source, middle, and near-target.
Mitigation <bcp14>MAY</bcp14> include various filtering mechanisms on SAV routers at different stages.</t>
        <t>After the mitigation strategies validating by the SAV controller, the mitigation instructions will be issued to SAV routers.
The near-source SAV routers <bcp14>MAY</bcp14> directly filter the spoofed packets using the specific forged source address. 
The middle SAV routers <bcp14>MAY</bcp14> route the spoofed packets of specific target addresses and protocols into unreachable destinations.
The near-target SAV routers <bcp14>MAY</bcp14> adopt other filtering techniques to block the malicious packets based on specific target address, protocol, and packet size.
Such a multi-stage mechanism can mitigate the DDoS attack as much as possible.</t>
      </section>
      <section anchor="suspect-based-ddos-traceback-mechanism">
        <name>Suspect-based DDoS Traceback Mechanism</name>
        <t>The data plane <bcp14>MUST</bcp14> record the communication logs of the suspicious host that forged source addresses in the past.
The communication logs include the spoofing packets' IP addresses, port numbers, packet amounts, intervals, frequencies, and so on.
These logs will be periodically transmitted to the SAV controller for further analysis.</t>
        <t>When DDoS attacks occur, zombie hosts with spoofing addresses are potentially communicating with the attackers.
Analyzing the communication logs of these suspicious zombie hosts, the SAV controller is able to trace back the attacker.</t>
      </section>
      <section anchor="connection-example">
        <name>Connection Example</name>
        <artwork><![CDATA[
            +-------------------------------+           
+-------+   |  +-------+         +-------+  |  +-------+
| SR 1  +---+  | SC 1  +----+----+ SC 2  |  +--+ SR 3  |
+-------+   |  +-------+    |    +-------+  |  +-------+
            |               |               |           
+-------+   |           +---+---+           |  +-------+
| SR 2  +---+           | SC 3  |           +--+ SR 4  |
+-------+   |           +-------+           |  +-------+
            +-------------------------------+           
SR: SAV router
SC: SAV controller

      Figure 2: Connection Example of SAV Devices  
]]></artwork>
        <t>Figure 2 depicts a connection example of SAV devices.
There are SAV routers distributed throughout the network, and they <bcp14>MUST</bcp14> communicate with the SAV controller in order to collaborate.
This document suggests that each SAV router stores several records of the SAV controller for backup.
Each SAV router <bcp14>MUST</bcp14> try to connect to its nearest SAV controller at all times.
If the SAV router loses contact with the present controller, it <bcp14>MUST</bcp14> seek the next closest controller.
Such a mechanism can assist SAV routers in maintaining connections to the best of their abilities.</t>
        <t>The SAV controller appears as a single server to the external.
Realizing the full functionality of the SAV controller, it <bcp14>MAY</bcp14> require much computing and storage resources.
As a result, the SAV controller can be built as clustered or distributed servers, where consistency and scalability are the primary concerns.
Each SAV controller can communicate with many SAV routers and perform the corresponding functions.</t>
      </section>
      <section anchor="establish-and-keep-communication">
        <name>Establish and Keep Communication</name>
        <artwork><![CDATA[
      +------------+               +------------+    
      |   SAV      +---------------> SAV        |    
      |   Router   <---------------+ Controller |    
      +------------+               +------------+    
]]></artwork>
        <t>Figure 3: SAV Router and SAV Controller Establish and Keep Communications</t>
        <t>Given the broad deployment of SAV routers, each configured SAV router <bcp14>MUST</bcp14> automatically establish connections with a SAV controller.
They <bcp14>MUST</bcp14> maintain contact after building connections.
This document suggests that an OSPF-like approach be considered.
Furthermore, the SAV router <bcp14>MUST</bcp14> be able to communicate with the SAV controller during DDoS attacks, and such a mechanism <bcp14>MAY</bcp14> refer to the DOTS Working Group <xref target="DOTS_WG"/>.</t>
      </section>
    </section>
    <section anchor="data-plane">
      <name>Data Plane</name>
      <t>The data plane is primarily comprised of distributed SAV routers.
SAV routers <bcp14>MAY</bcp14> be deployed in access networks, within Autonomous System (AS) domains, or at the AS domains boundary.
The general features of SAV routers are the same wherever they are deployed and can be summarized as follows.</t>
      <ul spacing="normal">
        <li>Collect Spoofing Information. SAV routers need to collect the statistical data of packets with spoofed addresses.
The information includes but is not limited to spoofed source addresses, destination addresses, port numbers, packet intervals, and frequencies.</li>
        <li>Collect information of suspicious hosts. When SAV routers detect a host forging source addresses, they <bcp14>MAY</bcp14> add the host to the list of suspicious hosts.
The SAV routers <bcp14>MUST</bcp14> then monitor the communication logs of these suspicious hosts.
The logs contain information that includes but is not limited to destination addresses, protocols, packet intervals, and frequencies.</li>
        <li>Receive and Execute Instructions. When the SAV controller issue the defense strategies, the SAV routers <bcp14>MUST</bcp14> respond appropriately.
The response mainly consists of Access Control Lists (ACL) filtering <xref target="RFC8519"/> and black-hole routing <xref target="RFC5635"/>.
SAV routers with various locations will perform different actions, such as filtering spoofed packets at the access network and black-hole routing at the AS domain boundary.</li>
        <li>Keep the Capacity for Escape. Attack traffic can sometimes exceed router links, resulting in disconnection from SAV routers to the SAV controller.
To avoid the terrible circumstance, SAV routers <bcp14>MUST</bcp14> reserve a specified amount of bandwidth to maintain a continuous connection with the SAV controller.</li>
      </ul>
    </section>
    <section anchor="control-plane">
      <name>Control Plane</name>
      <t>The control plane consists of the SAV controller that can be clustered or distributed servers.
The SAV controller are responsible for detecting, mitigating, and tracing back DDoS attacks.
They also provide spoofing address database and DDoS attacks database for others to reference.
The following are the features of the SAV controller.</t>
      <ul spacing="normal">
        <li>Aggregate Spoofing Information. The SAV controller collects spoofing statistics from SAV routers everywhere and aggregates them for further analysis.</li>
        <li>Detect DDoS Attacks. The SAV controller <bcp14>MUST</bcp14> determine whether a DDoS attack is ongoing based on the aggregated information. 
The judgment results <bcp14>MUST</bcp14> specify the attack target, traffic volume, impacted scope, duration time, and so on.</li>
        <li>Formulate Defense Strategies. Based on judgment results, the SAV controller will devise the appropriate defense strategies. 
The defense mechanisms <bcp14>MAY</bcp14> include ACL-based filtering and black-hole routing, which vary on specific SAV routers according to their locations. 
The SAV controller then issues detailed defense instructions to individual SAV routers for execution.</li>
        <li>traceback Attacks. The SAV controller also aggregates information about suspicious hosts and analyzes the communication logs of these suspicious hosts to locate the attacker.</li>
        <li>Build and Maintain the databases. The SAV controller <bcp14>MUST</bcp14> build and maintain the spoofing address database at a global view, which will, in turn, help to detect DDoS attacks. 
The SAV controller <bcp14>MUST</bcp14> also build the DDoS attack database with the detection results, which contain the details about each attack, such as the attacker address, the target address, traffic volume, impacted scope, and duration time.
Such a DDoS attack database will help to review the entire process of attacks.</li>
        <li>Provide Management Interface. Detecting, mitigating, and tracing back DDoS attacks <bcp14>MAY</bcp14> necessitate some manual settings in certain contexts.
The management interface provides a convenient way to adjust these settings.</li>
      </ul>
    </section>
    <section anchor="incentives-for-deployment">
      <name>Incentives for Deployment</name>
      <ul spacing="normal">
        <li>Provide DDoS Defense Ability. Whenever the attack traffic flows through the SAV domains, the SAV devices can react to mitigate the attack.
Any ISP that has deployed SAV devices can also obtain the spoofing address information and DDoS attacks information.
With this accurate and real-time information, ISPs can decide how to take measures to protect their customers.</li>
        <li>Locate the Malicious Hosts and Reduce Costs. With deployed SAV devices, ISPs can identify the zombie hosts and help to traceback the attackers.
These zombie hosts <bcp14>MAY</bcp14> incur additional traffic and energy costs.
Locating and removing these malicious hosts not only help to reduce the costs but also improve the reputation of ISPs.</li>
      </ul>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <t>This document includes no request to IANA.</t>
    </section>
    <section anchor="Security">
      <name>Security Considerations</name>
      <ul spacing="normal">
        <li>When DDoS attacks appear, the SAV routers <bcp14>MAY</bcp14> perform different filtering policies at different locations. If SAV routers get a bogus mitigation policy, they <bcp14>MAY</bcp14> undertake destructive filtering activities.</li>
        <li>The SAV controller is the core of the SADA and <bcp14>MUST</bcp14> be secure at all times. The SAV controller <bcp14>SHOULD</bcp14> be able to defend themselves against any invasions.</li>
        <li>The SAV controller's functions are based on statistical data aggregated from the SAV routers. Fake statistical data might have unanticipated consequences.</li>
      </ul>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC3704" target="https://www.rfc-editor.org/info/rfc3704">
          <front>
            <title>Ingress Filtering for Multihomed Networks</title>
            <author fullname="F. Baker" initials="F." surname="Baker">
              <organization/>
            </author>
            <author fullname="P. Savola" initials="P." surname="Savola">
              <organization/>
            </author>
            <date month="March" year="2004"/>
            <abstract>
              <t>BCP 38, RFC 2827, is designed to limit the impact of distributed denial of service attacks, by denying traffic with spoofed addresses access to the network, and to help ensure that traffic is traceable to its correct source network.  As a side effect of protecting the Internet against such attacks, the network implementing the solution also protects itself from this and other attacks, such as spoofed management access to networking equipment.  There are cases when this may create problems, e.g., with multihoming.  This document describes the current ingress filtering operational mechanisms, examines generic issues related to ingress filtering, and delves into the effects on multihoming in particular.  This memo updates RFC 2827.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="3704"/>
          <seriesInfo name="DOI" value="10.17487/RFC3704"/>
        </reference>
        <reference anchor="RFC8704" target="https://www.rfc-editor.org/info/rfc8704">
          <front>
            <title>Enhanced Feasible-Path Unicast Reverse Path Forwarding</title>
            <author fullname="K. Sriram" initials="K." surname="Sriram">
              <organization/>
            </author>
            <author fullname="D. Montgomery" initials="D." surname="Montgomery">
              <organization/>
            </author>
            <author fullname="J. Haas" initials="J." surname="Haas">
              <organization/>
            </author>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document identifies a need for and proposes improvement of the unicast Reverse Path Forwarding (uRPF) techniques (see RFC 3704) for detection and mitigation of source address spoofing (see BCP 38). Strict uRPF is inflexible about directionality, the loose uRPF is oblivious to directionality, and the current feasible-path uRPF attempts to strike a balance between the two (see RFC 3704). However, as shown in this document, the existing feasible-path uRPF still has shortcomings. This document describes enhanced feasible-path uRPF (EFP-uRPF) techniques that are more flexible (in a meaningful way) about directionality than the feasible-path uRPF (RFC 3704). The proposed EFP-uRPF methods aim to significantly reduce false positives regarding invalid detection in source address validation (SAV). Hence, they can potentially alleviate ISPs' concerns about the possibility of disrupting service for their customers and encourage greater deployment of uRPF techniques. This document updates RFC 3704.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="8704"/>
          <seriesInfo name="DOI" value="10.17487/RFC8704"/>
        </reference>
        <reference anchor="RFC5210" target="https://www.rfc-editor.org/info/rfc5210">
          <front>
            <title>A Source Address Validation Architecture (SAVA) Testbed and Deployment Experience</title>
            <author fullname="J. Wu" initials="J." surname="Wu">
              <organization/>
            </author>
            <author fullname="J. Bi" initials="J." surname="Bi">
              <organization/>
            </author>
            <author fullname="X. Li" initials="X." surname="Li">
              <organization/>
            </author>
            <author fullname="G. Ren" initials="G." surname="Ren">
              <organization/>
            </author>
            <author fullname="K. Xu" initials="K." surname="Xu">
              <organization/>
            </author>
            <author fullname="M. Williams" initials="M." surname="Williams">
              <organization/>
            </author>
            <date month="June" year="2008"/>
            <abstract>
              <t>Because the Internet forwards packets according to the IP destination address, packet forwarding typically takes place without inspection of the source address and malicious attacks have been launched using spoofed source addresses.  In an effort to enhance the Internet with IP source address validation, a prototype implementation of the IP Source Address Validation Architecture (SAVA) was created and an evaluation was conducted on an IPv6 network.  This document reports on the prototype implementation and the test results, as well as the lessons and insights gained from experimentation.  This memo defines an  Experimental Protocol for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5210"/>
          <seriesInfo name="DOI" value="10.17487/RFC5210"/>
        </reference>
        <reference anchor="RFC4987" target="https://www.rfc-editor.org/info/rfc4987">
          <front>
            <title>TCP SYN Flooding Attacks and Common Mitigations</title>
            <author fullname="W. Eddy" initials="W." surname="Eddy">
              <organization/>
            </author>
            <date month="August" year="2007"/>
            <abstract>
              <t>This document describes TCP SYN flooding attacks, which have been well-known to the community for several years.  Various countermeasures against these attacks, and the trade-offs of each, are described.  This document archives explanations of the attack and common defense techniques for the benefit of TCP implementers and administrators of TCP servers or networks, but does not make any standards-level recommendations.  This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4987"/>
          <seriesInfo name="DOI" value="10.17487/RFC4987"/>
        </reference>
        <reference anchor="RFC8519" target="https://www.rfc-editor.org/info/rfc8519">
          <front>
            <title>YANG Data Model for Network Access Control Lists (ACLs)</title>
            <author fullname="M. Jethanandani" initials="M." surname="Jethanandani">
              <organization/>
            </author>
            <author fullname="S. Agarwal" initials="S." surname="Agarwal">
              <organization/>
            </author>
            <author fullname="L. Huang" initials="L." surname="Huang">
              <organization/>
            </author>
            <author fullname="D. Blair" initials="D." surname="Blair">
              <organization/>
            </author>
            <date month="March" year="2019"/>
            <abstract>
              <t>This document defines a data model for Access Control Lists (ACLs). An ACL is a user-ordered set of rules used to configure the forwarding behavior in a device.  Each rule is used to find a match on a packet and define actions that will be performed on the packet.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8519"/>
          <seriesInfo name="DOI" value="10.17487/RFC8519"/>
        </reference>
        <reference anchor="RFC5635" target="https://www.rfc-editor.org/info/rfc5635">
          <front>
            <title>Remote Triggered Black Hole Filtering with Unicast Reverse Path Forwarding (uRPF)</title>
            <author fullname="W. Kumari" initials="W." surname="Kumari">
              <organization/>
            </author>
            <author fullname="D. McPherson" initials="D." surname="McPherson">
              <organization/>
            </author>
            <date month="August" year="2009"/>
            <abstract>
              <t>Remote Triggered Black Hole (RTBH) filtering is a popular and effective technique for the mitigation of denial-of-service attacks. This document expands upon destination-based RTBH filtering by outlining a method to enable filtering by source address as well.  This  memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5635"/>
          <seriesInfo name="DOI" value="10.17487/RFC5635"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="SAVNET_WG" target="https://datatracker.ietf.org/doc/charter-ietf-savnet/">
          <front>
            <title>Source Address Validation in Intra-domain and Inter-domain Networks</title>
            <author>
              <organization/>
            </author>
            <date year="2022" month="June"/>
          </front>
        </reference>
        <reference anchor="DOTS_WG" target="https://datatracker.ietf.org/doc/charter-ietf-dots/">
          <front>
            <title>DDoS Open Threat Signaling (dots)</title>
            <author>
              <organization/>
            </author>
            <date year="2022" month="March"/>
          </front>
        </reference>
      </references>
    </references>
    <section numbered="false" anchor="Acknowledgements">
      <name>Acknowledgements</name>
      <t>TBD</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
