<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-cui-savnet-anti-ddos-04" category="info" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.23.0 -->
  <front>
    <title abbrev="SAV-D">SAV-based Anti-DDoS Architecture</title>
    <seriesInfo name="Internet-Draft" value="draft-cui-savnet-anti-ddos-04"/>
    <author initials="Y." surname="Cui" fullname="Yong Cui">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <region>Beijing</region>
          <code>100084</code>
          <country>China</country>
        </postal>
        <email>cuiyong@tsinghua.edu.cn</email>
        <uri>http://www.cuiyong.net/</uri>
      </address>
    </author>
    <author initials="J." surname="Wu" fullname="Jianping Wu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <region>Beijing</region>
          <code>100084</code>
          <country>China</country>
        </postal>
        <email>jianping@cernet.edu.cn</email>
      </address>
    </author>
    <author initials="M." surname="Xing" fullname="Mingzhe Xing">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <region>Beijing</region>
          <code>100094</code>
          <country>China</country>
        </postal>
        <email>xingmz@zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="L." surname="Zhang" fullname="Lei Zhang">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <region>Beijing</region>
          <code>100094</code>
          <country>China</country>
        </postal>
        <email>zhanglei@zgclab.edu.cn</email>
      </address>
    </author>
    <date year="2024" month="September" day="12"/>
    <area>Routing</area>
    <workgroup>SAVNET Working Group</workgroup>
    <keyword>Source Address Validation</keyword>
    <keyword>DDoS Detection and Mitigation</keyword>
    <abstract>
      <?line 123?>

<t>Existing SAV schemes can not effectively defend against IP Spoofing DDoS under incremental deployment.
This document proposes SAV-D, a savnet based distributed defense architecture to enhance SAV's defense.
The main idea of SAV-D is to collect and aggregate more threat data from existing SAV devices and then distribute crucial knowledge to widespread devices, thus significantly expanding defense across the entire network.</t>
    </abstract>
  </front>
  <middle>
    <?line 129?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Distributed Denial-of-Service (DDoS) attacks have been a persistent cyber threat, where IP spoofing DDoS is one of the major contributors.
Amplification DDoS typically exploit IP spoofing to generate large volumes of traffic with small requests, allowing attackers to overwhelm the target's resources while evading detection.
Some other DDoS attacks (e.g., TCP SYN Flooding <xref target="RFC4987"/>) also forge source IP addresses in order to drain the target's resources.</t>
      <t>To eliminate IP spoofing, several Source Address Validation (SAV) schemes have been proposed, such as SAVI<xref target="RFC7039"/>, uRPF<xref target="RFC3704"/> and EFP-uRPF<xref target="RFC8704"/>. 
However, the defense effectiveness of current SAV schemes highly depends on the SAV devices' deployment ratio.
A large number of spoofed packets can only be prevented with a significantly high deployment ratio, but the incremental deployment process is often slow.
According to CAIDA's Spoofer Project<xref target="CAIDA"/>, 24.9% of IPv4 autonomous systems (excluding NAT), and 33.3% of IPv6 autonomous systems are still spoofable by March 2023.
This indicates a limited SAV deployment, thus the defense effectiveness.</t>
      <t>In the above context, this document offers an SAV-based anti-DDoS architecture (SAV-D) that incorporates the following advances.</t>
      <ul spacing="normal">
        <li>
          <t>SAV-honeynet based threat data collection. Each SAV device functions as a honeypot that does not directly drop spoofed packets but instead records the spoofing characteristics and sends them to a centralized control plane.</t>
        </li>
        <li>
          <t>Collaborative defense with both SAV and non-SAV devices. The control plane detects ongoing attacks and generates filtering rules.
These rules are then distributed to both SAV and non-SAV devices along the attack paths to manipulate malicious traffic.</t>
        </li>
        <li>
          <t>Threat information sharing with the victim-end. The control plane shares attack detection information and IP blocklists with victim-end defense systems to assist their mitigations.</t>
        </li>
      </ul>
      <t>Through the mechanisms of honeynet, data aggregation and distribution, SV-D can fully leverage the value of SAV devices and threat data, resulting in a significant defense improvement.</t>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

<!-- # Body [REPLACE] -->

</section>
    </section>
    <section anchor="problem-statement">
      <name>Problem Statement</name>
      <t>The effectiveness of existing SAV schemes highly relies on the deployment ratio of devices, which is currently limited.
Adversaries often actively test their bots for plausibility, packet loss, and amplification benefits.
This testing can force the bots to migrate from SAV domains to non-SAV domains, resulting in fewer spoofed packets being blocked by SAV devices.
Additionally, uRPF and EFP-uRPF have issues with filtering accuracy in certain scenarios.
Some managers may hesitate to enable SAV due to the probability of filtering errors.
Moreover, SAV can prevent spoofed packets from being sent out, but it cannot provide protection for the deployers.
The lack of direct benefits may also impede the deployment process.
In this context, there is a strong need to improve the defense capabilities of current SAV practices.</t>
      <t>To achieve the goal, it is essential to consider the following limitations. 
Firstly, due to the attack testing, directly dropping spoofed packets can reduce the possibility of capturing threat data.
Secondly, in amplification DDoS, the reflected packets sent to victims have the authentic src-IP, making them unfilterable by SAV devices. 
Lastly, although today's SAV mechanism can filter spoofed packets at local devices, the important threat information they provide has yet to be fully utilized. 
If victims were made aware of the type of spoofing traffic targeting them, they could execute faster and more accurate countermeasures.</t>
    </section>
    <section anchor="sav-d-architecture">
      <name>SAV-D Architecture</name>
      <artwork><![CDATA[
+------------------------------------------------------------+
|               Control Plane (SAV Controller)               |
+------------------------------------------------------------+
| +--------------+  +----------------+  +--------------+     |
| |Detecting DDoS|  |Generating Rules|  |Issuing Rules |     |
| +--------------+  +----------------+  +--------------+     |
|                 -\                  -\                     |
|                 -/                  -/                     |
|                   +----------------+  +--------------+     |
|                   |   Maintain IP  |  |Sharing Threat|     |
|                   |   Blocklists   |  |Information   |     |
|                   +----------------+  +--------------+ ... |
+---------/\-------------------------------------++----------+
          ||                 +-------------------+|
          ||                 |+------------------+|
          ||                 ||                  ||
+---------++-----------------\/--+ +-------------\/----------+
|            Data Plane          | |    Data Plane (Legacy   |
|           (SAV Devices)        | |Devices,Victims' Defense)|
+--------------------------------+ +-------------------------+
| +----------+ +---------------+ | |    +---------------+    |
| |Monitoring| |   Filtering   | | |    |   Filtering   |    |
| +----------+ +---------------+ | |    +---------------+    |
|              +---------------+ | |    +---------------+    |
|              |Receiving Rules| | |    |Receiving Rules|    |
|              +---------------+ | |    +---------------+    |
|                ...             | |           ...           |
+--------------------------------+ +-------------------------+

          Figure 1: The SAV-based Anti-DDoS Architecture
]]></artwork>
      <t>The proposed SAV-D is shown in Figure 1, whitch can be deployed on both intra-domain and inter-domain savnet.
It introduces a centralized control plane (i.e., the controller) that connects SAV devices, legacy devices, and victims' defense systems. 
The functions of the controller can be divided into three parts: attack detection, analysis and defense execution.
The controllers can collect spoofing characteristics from widespread SAV devices (as honeypots) and aggregate them for further analysis.
From a whole viewpoint, the controller can detect ongoing attacks and generate filtering rules for both SAV and non-SAV devices.
In addition, the controller can maintain IP blocklists based on the information reported by SAV devices, whitch can assist in detectiong DDoS attacks and generating filtering rules.
And then the rules will be distributed to corresponding devices to perform filtering.
Moreover, the controller will share the attack information with the victims' defense system to assist in their defense operations.</t>
      <section anchor="sav-controller">
        <name>SAV Controller</name>
        <t>The controller is a logical entity that can be implemented as a distributed or centralized cluster system.
The placement of controllers may take several factors into consideration, including latency, resiliency, and load balancing to connected devices.</t>
        <ul spacing="normal">
          <li>
            <t>To collect spoofing information, the controller will passively receive the data sent from the certified SAV devices.
The collected spoofing information should include but not limited to timestamp, 5-tuple (i.e., src-IP, dst-IP, src-port, dst-port, and protocol), TCP flag, packet size, and amounts.
This information will be readily stored in a database for further analysis.</t>
          </li>
          <li>
            <t>To analyze the aggregated statistics, the controller retrieves the spoofing information periodically (e.g., every 10 seconds).
The spoofed packets are analyzed based on their src-IP to detect reflection attacks or flooding attacks with certain algorithms.
A large volume of spoofed packets using a specific protocol (e.g., NTP, DNS) is a clear indication that the src-IP is being targeted by reflection attacks.
For flooding attacks, the possible evidence is a large number of spoofed packets with same target IP and different source IP.
The detection results include the attack target, type, duration, malicious IP lists, etc.
The detection algorithm should also fully consider the source of the forged source address packets. SAV devices deployed at different locations may report different levels of information.</t>
          </li>
          <li>
            <t>Generating filtering rules based on detection results is a straightforward process.
Before the reflection, the filtering rules are based on src-IP and ports.
After reflection, the src-IP is the server's address, and the dst-IP is the victim's address.
Considering the reflected packets are often much larger than legitimate packets, filtering rules could be generated based on dst-IP, ports, and packet size.
The time required to generate filtering rules depends on the severity and duration of attacks.</t>
          </li>
          <li>
            <t>Communicating with relevant devices consists of two folds.
One fold is distributing filtering rules to SAV and legacy devices and receiving feedback from SAV devices.
The other fold is to provide the victim's defense system with attack detection information, which is essential to efficiently stop the attack traffic.
In addition, the controller may generate more advanced threat intelligence information, such as geographic distribution statistics of IP blacklists, attribute statistics of forged IP, and so on.</t>
          </li>
        </ul>
      </section>
      <section anchor="sav-device">
        <name>SAV Device</name>
        <t>The SAV devices refer to routers or switches that are capable of validating the source IP address, including SAVI, uRPF, etc.
Compared to simply dropping spoofed packets, SAV devices are required to selectively allow spoofed packets through if they do not match the filtering rules.
This mechanism can be considered as a SAV-honeynet that records threat data related to spoofing.</t>
        <ul spacing="normal">
          <li>
            <t>The SAV device must register it to the controller when being installed, in which a unique identification number and other information (e.g., location, management IP address) may needed.
Whenever a spoofed packet is detected, the SAV device will record its timestamp, 5-tuple, TCP flag, packet size, and so on. 
However, only if the spoofed packet matches existing filtering rules, will the packet be dropped.
After a certain interval, the recorded data will be compressed and sent to the controller.</t>
          </li>
          <li>
            <t>Modern devices are generally capable of filtering based on packet length and counting the number of filtered packets.
Upon receiving filtering rules from the controller, the SAV device must install them into its data plane.
The SAV device also needs to record the number of packets filtered by each rule.
If a rule filters no packet during some periods, the rule will be automatically removed to save the rule's space.</t>
          </li>
        </ul>
      </section>
      <section anchor="legacy-device">
        <name>Legacy Device</name>
        <t>The commercial routers that are widely deployed in production are considered to be legacy devices.
Access Control List (ACL) is universally supported in today's routers for packet filtering.
Legacy devices can achieve extensive filtering by simply connecting their management interface to the controller and receiving the rules. 
Since ACLs may vary across legacy devices, filtering rules must be adapted to meet the specific requirements of each device.
The legacy routers can join the SAV-D system by registering it to the controller with information similar to the SAV router.
Once registered, the legacy routers can receive the filtering rules from the controller in a safe and trusted channel.
These rules will be installed into the data plane.
Similar to SAV devices, if a rule filters no packet during some period, the rule will be automatically removed.</t>
      </section>
      <section anchor="victims-defense">
        <name>Victims' Defense</name>
        <t>Victim's defense can be a DDoS mitigation system, a dedicated DDoS defense device, or any system or device that can receive filtering rules and threat information.
The SAV deployers can request access to the attack detection information related to themselves.
The information includes various details such as the attack target, type, duration, and malicious IP lists.
These details can serve as auxiliary signals to boost the detection time.
In addition, SAV-D can provide real-time updated IP blocklists, which can be efficiently used for blocking malicious traffic.
In an ideal situation, the defense system could provide an interface to directly receive the information and automatically perform corresponding filtering policies.
This mechanism could improve the effectiveness of DDoS defense and incentivize more SAV deployment.</t>
      </section>
      <section anchor="connection-example">
        <name>Connection Example</name>
        <artwork><![CDATA[
            +-------------------------------+           
+-------+   |  +-------+         +-------+  |  +-------+
| SR 1  +---+  | SC 1  +----+----+ SC 2  |  +--+ SR 3  |
+-------+   |  +-------+    |    +-------+  |  +-------+
            |               |               |           
+-------+   |           +---+---+           |  +-------+
| SR 2  +---+           | SC 3  |           +--+ SR 4  |
+-------+   |           +-------+           |  +-------+
            +-------------------------------+           
SR: SAV router
SC: SAV controller

      Figure 2: Connection Example of SAV Devices  
]]></artwork>
        <t>Figure 2 depicts a connection example of SAV-D system.
There are SAV routers distributed throughout the network, and they <bcp14>MUST</bcp14> communicate with the SAV controller in order to collaborate.
This document suggests that each SAV router stores several records of the SAV controller for backup.
Each SAV router <bcp14>MUST</bcp14> try to connect to its nearest SAV controller at all times.
If the SAV router loses contact with the present controller, it <bcp14>MUST</bcp14> seek the next closest controller.
Such a mechanism can assist SAV routers in maintaining connections to the best of their abilities.</t>
        <t>The SAV controller appears as a single entity to the external.
Realizing the full functionality of the SAV controller <bcp14>MAY</bcp14> require many computing and storage resources.
As a result, the SAV controller can be built as clustered or distributed servers, where consistency and scalability are the primary concerns.
Each SAV controller can communicate with many SAV routers and perform the corresponding functions.</t>
      </section>
      <section anchor="data-transmission">
        <name>Data transmission</name>
        <t>Data transmission includes bidirectional data transmission of control plane and data plane.
The monitoring information of the spoofed src-IP packets is transmitted from the data plane to the control plane.
Following the existing definition of savnet, the monitoring information transmission protocol should follow YANG Data Model for Intra-domain and Inter-domain Source Address Validation.
In the opposite direction, the filtering rules and threat information are transmitted.
The transmission of filtering instructions can be referred to DOTS Telemetry<xref target="RFC8783"/>, whitch describes the transmission requirements of collaborative filtering instructions.
The threat information includes the attack detection resultant, victim IP ddress segmant and etc. <xref target="RFC9244"/> and <xref target="RFC8783"/> describe the transmission requirements for threat information, whitch can be the candidate protocol.</t>
      </section>
    </section>
    <section anchor="workflow">
      <name>Workflow</name>
      <t>The proposed SAV-D architecture can collaboratively defend the IP spoofing DDoS in a distributed pattern.
The typical procedures are described as follows.</t>
      <t>(i). The SAV routers validate and record the characteristics of spoofed packets, and periodically send this data to the logically centralized controller, where the global spoofing information is aggregated.</t>
      <t>(ii). Based on the aggregated statistics, the controller can accurately detect whether there are ongoing IP spoofing attacks with the help of predefined algorithms.</t>
      <t>(iii). Based on the detection results, the controller can generate defense policies for both SAV and non-SAV devices. The policies mainly involve filtering rules on 5-tuple and packet size.</t>
      <t>(iv). For detected attacks, the defense policies will be distributed to all SAV and legacy devices.
Moreover, the detection results will also be sent to the victim's defense system.</t>
      <t>(v). The filtering rules will be installed on relevant devices to block the malicious packets.
If a rule filters no packet during some period, the rule will be automatically removed.</t>
    </section>
    <section anchor="scalability">
      <name>Scalability</name>
      <t>When there are large amounts of devices introduced into the SAV-D, the control plane could be implemented with hierarchical structure, where multiple sub-level controllers are in charge of the devices inside AS domains. 
The single top-level controller can exchange information (i.e., IP spoofing statistics and filtering rules) with these sub-level controllers.
Additionally, a large number of attacks and filtering rules could introduce another scalability problem.
One possible solution is to prioritize the mitigations of these attacks, where severe attacks will be tackled first so that the number of filtering rules will be limited to moderate scope.</t>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <t>This document includes no request to IANA.</t>
    </section>
    <section anchor="Security">
      <name>Security Considerations</name>
      <t>Adversaries may send forged IP spoofing statistics to the control plane or send forged filtering rules to SAV and legacy devices, which could cause severe harm to legitimate traffic.
To avoid this situation, the information transmissions of SAV-D could be encrypted with certification.
There could also be attacks directly on the SAV-D controllers.
As common systems, security systems (e.g., firewalls) are essential to protect the controllers.
In addition, hot-standby controllers can also significantly improve security and availability.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC3704">
          <front>
            <title>Ingress Filtering for Multihomed Networks</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="P. Savola" initials="P." surname="Savola"/>
            <date month="March" year="2004"/>
            <abstract>
              <t>BCP 38, RFC 2827, is designed to limit the impact of distributed denial of service attacks, by denying traffic with spoofed addresses access to the network, and to help ensure that traffic is traceable to its correct source network. As a side effect of protecting the Internet against such attacks, the network implementing the solution also protects itself from this and other attacks, such as spoofed management access to networking equipment. There are cases when this may create problems, e.g., with multihoming. This document describes the current ingress filtering operational mechanisms, examines generic issues related to ingress filtering, and delves into the effects on multihoming in particular. This memo updates RFC 2827. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="3704"/>
          <seriesInfo name="DOI" value="10.17487/RFC3704"/>
        </reference>
        <reference anchor="RFC8704">
          <front>
            <title>Enhanced Feasible-Path Unicast Reverse Path Forwarding</title>
            <author fullname="K. Sriram" initials="K." surname="Sriram"/>
            <author fullname="D. Montgomery" initials="D." surname="Montgomery"/>
            <author fullname="J. Haas" initials="J." surname="Haas"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document identifies a need for and proposes improvement of the unicast Reverse Path Forwarding (uRPF) techniques (see RFC 3704) for detection and mitigation of source address spoofing (see BCP 38). Strict uRPF is inflexible about directionality, the loose uRPF is oblivious to directionality, and the current feasible-path uRPF attempts to strike a balance between the two (see RFC 3704). However, as shown in this document, the existing feasible-path uRPF still has shortcomings. This document describes enhanced feasible-path uRPF (EFP-uRPF) techniques that are more flexible (in a meaningful way) about directionality than the feasible-path uRPF (RFC 3704). The proposed EFP-uRPF methods aim to significantly reduce false positives regarding invalid detection in source address validation (SAV). Hence, they can potentially alleviate ISPs' concerns about the possibility of disrupting service for their customers and encourage greater deployment of uRPF techniques. This document updates RFC 3704.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="8704"/>
          <seriesInfo name="DOI" value="10.17487/RFC8704"/>
        </reference>
        <reference anchor="RFC4987">
          <front>
            <title>TCP SYN Flooding Attacks and Common Mitigations</title>
            <author fullname="W. Eddy" initials="W." surname="Eddy"/>
            <date month="August" year="2007"/>
            <abstract>
              <t>This document describes TCP SYN flooding attacks, which have been well-known to the community for several years. Various countermeasures against these attacks, and the trade-offs of each, are described. This document archives explanations of the attack and common defense techniques for the benefit of TCP implementers and administrators of TCP servers or networks, but does not make any standards-level recommendations. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4987"/>
          <seriesInfo name="DOI" value="10.17487/RFC4987"/>
        </reference>
        <reference anchor="RFC7039">
          <front>
            <title>Source Address Validation Improvement (SAVI) Framework</title>
            <author fullname="J. Wu" initials="J." surname="Wu"/>
            <author fullname="J. Bi" initials="J." surname="Bi"/>
            <author fullname="M. Bagnulo" initials="M." surname="Bagnulo"/>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="C. Vogt" initials="C." role="editor" surname="Vogt"/>
            <date month="October" year="2013"/>
            <abstract>
              <t>Source Address Validation Improvement (SAVI) methods were developed to prevent nodes attached to the same IP link from spoofing each other's IP addresses, so as to complement ingress filtering with finer-grained, standardized IP source address validation. This document is a framework document that describes and motivates the design of the SAVI methods. Particular SAVI methods are described in other documents.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7039"/>
          <seriesInfo name="DOI" value="10.17487/RFC7039"/>
        </reference>
        <reference anchor="RFC8783">
          <front>
            <title>Distributed Denial-of-Service Open Threat Signaling (DOTS) Data Channel Specification</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="T. Reddy.K" initials="T." role="editor" surname="Reddy.K"/>
            <date month="May" year="2020"/>
            <abstract>
              <t>The document specifies a Distributed Denial-of-Service Open Threat Signaling (DOTS) data channel used for bulk exchange of data that cannot easily or appropriately communicated through the DOTS signal channel under attack conditions.</t>
              <t>This is a companion document to "Distributed Denial-of-Service Open Threat Signaling (DOTS) Signal Channel Specification" (RFC 8782).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8783"/>
          <seriesInfo name="DOI" value="10.17487/RFC8783"/>
        </reference>
        <reference anchor="RFC9244">
          <front>
            <title>Distributed Denial-of-Service Open Threat Signaling (DOTS) Telemetry</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="T. Reddy.K" initials="T." role="editor" surname="Reddy.K"/>
            <author fullname="E. Doron" initials="E." surname="Doron"/>
            <author fullname="M. Chen" initials="M." surname="Chen"/>
            <author fullname="J. Shallow" initials="J." surname="Shallow"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>This document aims to enrich the Distributed Denial-of-Service Open Threat Signaling (DOTS) signal channel protocol with various telemetry attributes, allowing for optimal Distributed Denial-of-Service (DDoS) attack mitigation. It specifies the normal traffic baseline and attack traffic telemetry attributes a DOTS client can convey to its DOTS server in the mitigation request, the mitigation status telemetry attributes a DOTS server can communicate to a DOTS client, and the mitigation efficacy telemetry attributes a DOTS client can communicate to a DOTS server. The telemetry attributes can assist the mitigator in choosing the DDoS mitigation techniques and performing optimal DDoS attack mitigation.</t>
              <t>This document specifies two YANG modules: one for representing DOTS telemetry message types and one for sharing the attack mapping details over the DOTS data channel.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9244"/>
          <seriesInfo name="DOI" value="10.17487/RFC9244"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="CAIDA" target="https://spoofer.caida.org/summary.php">
          <front>
            <title>State of IP Spoofing</title>
            <author>
              <organization/>
            </author>
            <date year="2023" month="September"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 377?>

<section numbered="false" anchor="Acknowledgements">
      <name>Acknowledgements</name>
      <t>Thanks to Linbo Hui, Yannan Hu, Wenyong Wang, Shuisong Hu, Haoran Luo, Linzhe Li for their contribution to this draft.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
