{"draft":"draft-ietf-dots-telemetry-use-cases-16","doc_id":"RFC9387","title":"Use Cases for DDoS Open Threat Signaling (DOTS) Telemetry","authors":["Y. Hayashi","M. Chen","L. Su"],"format":["HTML","TEXT","PDF","XML"],"page_count":"26","pub_status":"INFORMATIONAL","status":"INFORMATIONAL","source":"DDoS Open Threat Signaling","abstract":"DDoS Open Threat Signaling (DOTS) telemetry enriches the base DOTS\r\nprotocols to assist the mitigator in using efficient DDoS attack\r\nmitigation techniques in a network. This document presents sample use\r\ncases for DOTS telemetry. It discusses what components are deployed\r\nin the network, how they cooperate, and what information is exchanged\r\nto effectively use these techniques.","pub_date":"April 2023","keywords":["DOTS","Telemetry","Use cases","DDoS","Automation"],"obsoletes":[],"obsoleted_by":[],"updates":[],"updated_by":[],"see_also":[],"doi":"10.17487\/RFC9387","errata_url":null}