<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.39 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-cui-savnet-anti-ddos-02" category="info" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.18.0 -->
  <front>
    <title abbrev="SAV-D">SAV-based Anti-DDoS Architecture</title>
    <seriesInfo name="Internet-Draft" value="draft-cui-savnet-anti-ddos-02"/>
    <author initials="Y." surname="Cui" fullname="Yong Cui">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <region>Beijing</region>
          <code>100084</code>
          <country>China</country>
        </postal>
        <email>cuiyong@tsinghua.edu.cn</email>
        <uri>http://www.cuiyong.net/</uri>
      </address>
    </author>
    <author initials="J." surname="Wu" fullname="Jianping Wu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <region>Beijing</region>
          <code>100084</code>
          <country>China</country>
        </postal>
        <email>jianping@cernet.edu.cn</email>
      </address>
    </author>
    <author initials="L." surname="Zhang" fullname="Lei Zhang">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <region>Beijing</region>
          <code>100094</code>
          <country>China</country>
        </postal>
        <email>zhanglei@zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="L." surname="Li" fullname="Linzhe Li">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <region>Beijing</region>
          <code>100094</code>
          <country>China</country>
        </postal>
        <email>lilz@zgclab.edu.cn</email>
      </address>
    </author>
    <date year="2023" month="September" day="12"/>
    <area>Routing</area>
    <workgroup>SAVNET Working Group</workgroup>
    <keyword>Source Address Validation</keyword>
    <keyword>DDoS Detection and Mitigation</keyword>
    <abstract>
      <?line 120?>

<t>Existing SAV schemes can not effectively defend against IP Spoofing DDoS under incremental deployment.
This document proposes SAV-D, a savnet based distributed defense architecture to enhance SAV's defense.
The main idea of SAV-D is to collect and aggregate more threat data from existing SAV devices and then distribute crucial knowledge to widespread devices, thus significantly expanding defense across the entire network.</t>
    </abstract>
  </front>
  <middle>
    <?line 126?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Distributed Denial-of-Service (DDoS) attacks have been a persistent cyber threat, where IP spoofing DDoS is one of the major contributors.
Amplification DDoS typically exploit IP spoofing to generate large volumes of traffic with small requests, allowing attackers to overwhelm the target's resources while evading detection.
Some other DDoS attacks (e.g., TCP SYN Flooding <xref target="RFC4987"/>) also forge source IP addresses in order to drain the target's resources.</t>
      <t>To eliminate IP spoofing, several Source Address Validation (SAV) schemes have been proposed, such as SAVI<xref target="RFC7039"/>, uRPF<xref target="RFC3704"/> and EFP-uRPF<xref target="RFC8704"/>. 
However, the defense effectiveness of current SAV schemes highly depends on the SAV devices' deployment ratio.
A large number of spoofed packets can only be prevented with a significantly high deployment ratio, but the incremental deployment process is often slow.
According to CAIDA's Spoofer Project<xref target="CAIDA"/>, 24.9% of IPv4 autonomous systems (excluding NAT), and 33.3% of IPv6 autonomous systems are still spoofable by March 2023.
This indicates a limited SAV deployment, thus the defense effectiveness.</t>
      <t>In the above context, this document offers an SAV-based anti-DDoS architecture (SAV-D) that incorporates the following advances.</t>
      <ul spacing="normal">
        <li>SAV-honeynet based threat data collection. Each SAV device functions as a honeypot that does not directly drop spoofed packets but instead records the spoofing characteristics and sends them to a centralized control plane.</li>
        <li>Collaborative defense with both SAV and non-SAV devices. The control plane detects ongoing attacks and generates filtering rules.
These rules are then distributed to both SAV and non-SAV devices along the attack paths to manipulate malicious traffic.</li>
        <li>Threat information sharing with the victim-end. The control plane shares attack detection information and IP blocklists with victim-end defense systems to assist their mitigations.</li>
      </ul>
      <t>Through the mechanisms of honeynet, data aggregation and distribution, SV-D can fully leverage the value of SAV devices and threat data, resulting in a significant defense improvement.</t>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

<!-- # Body [REPLACE] -->

</section>
    </section>
    <section anchor="problem-statement">
      <name>Problem Statement</name>
      <t>The effectiveness of existing SAV schemes highly relies on the deployment ratio of devices, which is currently limited.
Adversaries often actively test their bots for plausibility, packet loss, and amplification benefits.
This testing can force the bots to migrate from SAV domains to non-SAV domains, resulting in fewer spoofed packets being blocked by SAV devices.
Additionally, uRPF and EFP-uRPF have issues with filtering accuracy in certain scenarios.
Some managers may hesitate to enable SAV due to the probability of filtering errors.
Moreover, SAV can prevent spoofed packets from being sent out, but it cannot provide protection for the deployers.
The lack of direct benefits may also impede the deployment process.
In this context, there is a strong need to improve the defense capabilities of current SAV practices.</t>
      <t>To achieve the goal, it is essential to consider the following limitations. 
Firstly, due to the attack testing, directly dropping spoofed packets can reduce the possibility of capturing threat data.
Secondly, in amplification DDoS, the reflected packets sent to victims have the authentic src-IP, making them unfilterable by SAV devices. 
Lastly, although today's SAV mechanism can filter spoofed packets at local devices, the important threat information they provide has yet to be fully utilized. 
If victims were made aware of the type of spoofing traffic targeting them, they could execute faster and more accurate countermeasures.</t>
    </section>
    <section anchor="sav-d-architecture">
      <name>SAV-D Architecture</name>
      <artwork><![CDATA[
+------------------------------------------------------------+
|               Control Plane (SAV Controller)               |
+------------------------------------------------------------+
| +--------------+  +----------------+  +--------------+     |
| |Detecting DDoS|  |Generating Rules|  |Issuing Rules |     |
| +--------------+  +----------------+  +--------------+     |
|                 -\                  -\                     |
|                 -/                  -/                     |
|                   +----------------+  +--------------+     |
|                   |   Maintain IP  |  |Sharing Threat|     |
|                   |   Blocklists   |  |Information   |     |
|                   +----------------+  +--------------+ ... |
+---------/\-------------------------------------++----------+
          ||                 +-------------------+|
          ||                 |+------------------+|
          ||                 ||                  ||
+---------++-----------------\/--+ +-------------\/----------+
|            Data Plane          | |    Data Plane (Legacy   |
|           (SAV Devices)        | |Devices,Victims' Defense)|
+--------------------------------+ +-------------------------+
| +----------+ +---------------+ | |    +---------------+    |
| |Monitoring| |   Filtering   | | |    |   Filtering   |    |
| +----------+ +---------------+ | |    +---------------+    |
|              +---------------+ | |    +---------------+    |
|              |Receiving Rules| | |    |Receiving Rules|    |
|              +---------------+ | |    +---------------+    |
|                ...             | |           ...           |
+--------------------------------+ +-------------------------+

          Figure 1: The SAV-based Anti-DDoS Architecture
]]></artwork>
      <t>The proposed SAV-D is shown in Figure 1, whitch can be deployed on both intra-domain and inter-domain savnet.
It introduces a centralized control plane (i.e., the controller) that connects SAV devices, legacy devices, and victims' defense systems. 
The functions of the controller can be divided into three parts: attack detection, analysis and defense execution.
The controllers can collect spoofing characteristics from widespread SAV devices (as honeypots) and aggregate them for further analysis.
From a whole viewpoint, the controller can detect ongoing attacks and generate filtering rules for both SAV and non-SAV devices.
In addition, the controller can maintain IP blocklists based on the information reported by SAV devices, whitch can assist in detectiong DDoS attacks and generating filtering rules.
And then the rules will be distributed to corresponding devices to perform filtering.
Moreover, the controller will share the attack information with the victims' defense system to assist in their defense operations.</t>
      <section anchor="sav-controller">
        <name>SAV Controller</name>
        <t>The controller is a logical entity that can be implemented as a distributed or centralized cluster system.
The placement of controllers may take several factors into consideration, including latency, resiliency, and load balancing to connected devices.</t>
        <ul spacing="normal">
          <li>To collect spoofing information, the controller will passively receive the data sent from the certified SAV devices.
The collected spoofing information should include but not limited to timestamp, 5-tuple (i.e., src-IP, dst-IP, src-port, dst-port, and protocol), TCP flag, packet size, and amounts.
This information will be readily stored in a database for further analysis.</li>
          <li>To analyze the aggregated statistics, the controller retrieves the spoofing information periodically (e.g., every 10 seconds).
The spoofed packets are analyzed based on their src-IP to detect reflection attacks or flooding attacks with certain algorithms.
A large volume of spoofed packets using a specific protocol (e.g., NTP, DNS) is a clear indication that the src-IP is being targeted by reflection attacks.
For flooding attacks, the posssible evidence is a large number of spoofed packets with same target IP and different source IP.
The detection results include the attack target, type, duration, malicious IP lists, etc.</li>
          <li>Generating filtering rules based on detection results is a straightforward process.
Before the reflection, the filtering rules are based on src-IP and ports.
After reflection, the src-IP is the server's address, and the dst-IP is the victim's address.
Considering the reflected packets are often much larger than legitimate packets, filtering rules could be generated based on dst-IP, ports, and packet size.</li>
          <li>Communicating with relevant devices consists of two folds.
One fold is distributing filtering rules to SAV and legacy devices and receiving feedback from SAV devices.
The other fold is to provide the victim's defense system with attack detection information, which is essential to efficiently stop the attack traffic.</li>
        </ul>
      </section>
      <section anchor="sav-device">
        <name>SAV Device</name>
        <t>The SAV devices refer to routers or switches that are capable of validating the source IP address, including SAVI, uRPF, etc.
Compared to simply dropping spoofed packets, SAV devices are required to selectively allow spoofed packets through if they do not match the filtering rules.
This mechanism can be considered as a SAV-honeynet that records threat data related to spoofing.</t>
        <ul spacing="normal">
          <li>The SAV device must register it to the controller when being installed, in which a unique identification number and other information (e.g., location, management IP address) may needed.
Whenever a spoofed packet is detected, the SAV device will record its timestamp, 5-tuple, TCP flag, packet size, and so on. 
However, only if the spoofed packet matches existing filtering rules, will the packet be dropped.
After a certain interval, the recorded data will be compressed and sent to the controller.</li>
          <li>Modern devices are generally capable of filtering based on packet length and counting the number of filtered packets.
Upon receiving filtering rules from the controller, the SAV device must install them into its data plane.
The SAV device also needs to record the number of packets filtered by each rule.
If a rule filters no packet during some periods, the rule will be automatically removed to save the rule's space.</li>
        </ul>
      </section>
      <section anchor="legacy-device">
        <name>Legacy Device</name>
        <t>The commercial routers that are widely deployed in production are considered to be legacy devices.
Access Control List (ACL) is universally supported in today's routers for packet filtering.
Legacy devices can achieve extensive filtering by simply connecting their management interface to the controller and receiving the rules. 
Since ACLs may vary across legacy devices, filtering rules must be adapted to meet the specific requirements of each device.
The legacy routers can join the SAV-D system by registering it to the controller with information similar to the SAV router.
Once registered, the legacy routers can receive the filtering rules from the controller in a safe and trusted channel.
These rules will be installed into the data plane.
Similar to SAV devices, if a rule filters no packet during some period, the rule will be automatically removed.</t>
      </section>
      <section anchor="victims-defense">
        <name>Victims' Defense</name>
        <t>The SAV deployers can request access to the attack detection information related to themselves.
The information includes various details such as the attack target, type, duration, and malicious IP lists.
These details can serve as auxiliary signals to boost the detection time.
In addition, SAV-D can provide real-time updated IP blocklists, which can be efficiently used for blocking malicious traffic.
In an ideal situation, the defense system could provide an interface to directly receive the information and automatically perform corresponding filtering policies.
This mechanism could improve the effectiveness of DDoS defense and incentivize more SAV deployment.</t>
      </section>
      <section anchor="connection-example">
        <name>Connection Example</name>
        <artwork><![CDATA[
            +-------------------------------+           
+-------+   |  +-------+         +-------+  |  +-------+
| SR 1  +---+  | SC 1  +----+----+ SC 2  |  +--+ SR 3  |
+-------+   |  +-------+    |    +-------+  |  +-------+
            |               |               |           
+-------+   |           +---+---+           |  +-------+
| SR 2  +---+           | SC 3  |           +--+ SR 4  |
+-------+   |           +-------+           |  +-------+
            +-------------------------------+           
SR: SAV router
SC: SAV controller

      Figure 2: Connection Example of SAV Devices  
]]></artwork>
        <t>Figure 2 depicts a connection example of SAV-D system.
There are SAV routers distributed throughout the network, and they <bcp14>MUST</bcp14> communicate with the SAV controller in order to collaborate.
This document suggests that each SAV router stores several records of the SAV controller for backup.
Each SAV router <bcp14>MUST</bcp14> try to connect to its nearest SAV controller at all times.
If the SAV router loses contact with the present controller, it <bcp14>MUST</bcp14> seek the next closest controller.
Such a mechanism can assist SAV routers in maintaining connections to the best of their abilities.</t>
        <t>The SAV controller appears as a single entity to the external.
Realizing the full functionality of the SAV controller <bcp14>MAY</bcp14> require many computing and storage resources.
As a result, the SAV controller can be built as clustered or distributed servers, where consistency and scalability are the primary concerns.
Each SAV controller can communicate with many SAV routers and perform the corresponding functions.</t>
      </section>
      <section anchor="data-transmission">
        <name>Data transmission</name>
        <t>Data transmission includes bidirectional data transmission of control plane and data plane.
The monitoring information of the spoofed src-IP packets is transmitted from the data plane to the control plane.
Following the existing definition of savnet, the monitoring information transmission protocol should follow YANG Data Model for Intra-domain and Inter-domain Source Address Validation.
In the opposite direction, the filtering rules and threat information are transmitted.
The transmission of filtering instructions can be referred to DOTS Telemetry<xref target="RFC8783"/>, whitch describes the transmission requirements of collaborative filtering instructions.
The threat information includes the attack detection resultant, victim IP ddress segmant and etc. <xref target="RFC9244"/> and <xref target="RFC8783"/> describe the transmission requirements for threat information, whitch can be the candidate protocol.</t>
      </section>
    </section>
    <section anchor="workflow">
      <name>Workflow</name>
      <t>The proposed SAV-D architecture can collaboratively defend the IP spoofing DDoS in a distributed pattern.
The typical procedures are described as follows.</t>
      <t>(i). The SAV routers validate and record the characteristics of spoofed packets, and periodically send this data to the logically centralized controller, where the global spoofing information is aggregated.</t>
      <t>(ii). Based on the aggregated statistics, the controller can accurately detect whether there are ongoing IP spoofing attacks with the help of predefined algorithms.</t>
      <t>(iii). Based on the detection results, the controller can generate defense policies for both SAV and non-SAV devices. The policies mainly involve filtering rules on 5-tuple and packet size.</t>
      <t>(iv). For detected attacks, the defense policies will be distributed to all SAV and legacy devices.
Moreover, the detection results will also be sent to the victim's defense system.</t>
      <t>(v). The filtering rules will be installed on relevant devices to block the malicious packets.
If a rule filters no packet during some period, the rule will be automatically removed.</t>
    </section>
    <section anchor="scalability">
      <name>Scalability</name>
      <t>When there are large amounts of devices introduced into the SAV-D, the control plane could be implemented with hierarchical structure, where multiple sub-level controllers are in charge of the devices inside AS domains. 
The single top-level controller can exchange information (i.e., IP spoofing statistics and filtering rules) with these sub-level controllers.
Additionally, a large number of attacks and filtering rules could introduce another scalability problem.
One possible solution is to prioritize the mitigations of these attacks, where severe attacks will be tackled first so that the number of filtering rules will be limited to moderate scope.</t>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <t>This document includes no request to IANA.</t>
    </section>
    <section anchor="Security">
      <name>Security Considerations</name>
      <t>Adversaries may send forged IP spoofing statistics to the control plane or send forged filtering rules to SAV and legacy devices, which could cause severe harm to legitimate traffic.
To avoid this situation, the information transmissions of SAV-D could be encrypted with certification.
There could also be attacks directly on the SAV-D controllers.
As common systems, security systems (e.g., firewalls) are essential to protect the controllers.
In addition, hot-standby controllers can also significantly improve security and availability.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC3704">
          <front>
            <title>Ingress Filtering for Multihomed Networks</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="P. Savola" initials="P." surname="Savola"/>
            <date month="March" year="2004"/>
            <abstract>
              <t>BCP 38, RFC 2827, is designed to limit the impact of distributed denial of service attacks, by denying traffic with spoofed addresses access to the network, and to help ensure that traffic is traceable to its correct source network. As a side effect of protecting the Internet against such attacks, the network implementing the solution also protects itself from this and other attacks, such as spoofed management access to networking equipment. There are cases when this may create problems, e.g., with multihoming. This document describes the current ingress filtering operational mechanisms, examines generic issues related to ingress filtering, and delves into the effects on multihoming in particular. This memo updates RFC 2827. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="3704"/>
          <seriesInfo name="DOI" value="10.17487/RFC3704"/>
        </reference>
        <reference anchor="RFC8704">
          <front>
            <title>Enhanced Feasible-Path Unicast Reverse Path Forwarding</title>
            <author fullname="K. Sriram" initials="K." surname="Sriram"/>
            <author fullname="D. Montgomery" initials="D." surname="Montgomery"/>
            <author fullname="J. Haas" initials="J." surname="Haas"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document identifies a need for and proposes improvement of the unicast Reverse Path Forwarding (uRPF) techniques (see RFC 3704) for detection and mitigation of source address spoofing (see BCP 38). Strict uRPF is inflexible about directionality, the loose uRPF is oblivious to directionality, and the current feasible-path uRPF attempts to strike a balance between the two (see RFC 3704). However, as shown in this document, the existing feasible-path uRPF still has shortcomings. This document describes enhanced feasible-path uRPF (EFP-uRPF) techniques that are more flexible (in a meaningful way) about directionality than the feasible-path uRPF (RFC 3704). The proposed EFP-uRPF methods aim to significantly reduce false positives regarding invalid detection in source address validation (SAV). Hence, they can potentially alleviate ISPs' concerns about the possibility of disrupting service for their customers and encourage greater deployment of uRPF techniques. This document updates RFC 3704.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="8704"/>
          <seriesInfo name="DOI" value="10.17487/RFC8704"/>
        </reference>
        <reference anchor="RFC4987">
          <front>
            <title>TCP SYN Flooding Attacks and Common Mitigations</title>
            <author fullname="W. Eddy" initials="W." surname="Eddy"/>
            <date month="August" year="2007"/>
            <abstract>
              <t>This document describes TCP SYN flooding attacks, which have been well-known to the community for several years. Various countermeasures against these attacks, and the trade-offs of each, are described. This document archives explanations of the attack and common defense techniques for the benefit of TCP implementers and administrators of TCP servers or networks, but does not make any standards-level recommendations. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4987"/>
          <seriesInfo name="DOI" value="10.17487/RFC4987"/>
        </reference>
        <reference anchor="RFC7039">
          <front>
            <title>Source Address Validation Improvement (SAVI) Framework</title>
            <author fullname="J. Wu" initials="J." surname="Wu"/>
            <author fullname="J. Bi" initials="J." surname="Bi"/>
            <author fullname="M. Bagnulo" initials="M." surname="Bagnulo"/>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="C. Vogt" initials="C." role="editor" surname="Vogt"/>
            <date month="October" year="2013"/>
            <abstract>
              <t>Source Address Validation Improvement (SAVI) methods were developed to prevent nodes attached to the same IP link from spoofing each other's IP addresses, so as to complement ingress filtering with finer-grained, standardized IP source address validation. This document is a framework document that describes and motivates the design of the SAVI methods. Particular SAVI methods are described in other documents.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7039"/>
          <seriesInfo name="DOI" value="10.17487/RFC7039"/>
        </reference>
        <reference anchor="RFC8783">
          <front>
            <title>Distributed Denial-of-Service Open Threat Signaling (DOTS) Data Channel Specification</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="T. Reddy.K" initials="T." role="editor" surname="Reddy.K"/>
            <date month="May" year="2020"/>
            <abstract>
              <t>The document specifies a Distributed Denial-of-Service Open Threat Signaling (DOTS) data channel used for bulk exchange of data that cannot easily or appropriately communicated through the DOTS signal channel under attack conditions.</t>
              <t>This is a companion document to "Distributed Denial-of-Service Open Threat Signaling (DOTS) Signal Channel Specification" (RFC 8782).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8783"/>
          <seriesInfo name="DOI" value="10.17487/RFC8783"/>
        </reference>
        <reference anchor="RFC9244">
          <front>
            <title>Distributed Denial-of-Service Open Threat Signaling (DOTS) Telemetry</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="T. Reddy.K" initials="T." role="editor" surname="Reddy.K"/>
            <author fullname="E. Doron" initials="E." surname="Doron"/>
            <author fullname="M. Chen" initials="M." surname="Chen"/>
            <author fullname="J. Shallow" initials="J." surname="Shallow"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>This document aims to enrich the Distributed Denial-of-Service Open Threat Signaling (DOTS) signal channel protocol with various telemetry attributes, allowing for optimal Distributed Denial-of-Service (DDoS) attack mitigation. It specifies the normal traffic baseline and attack traffic telemetry attributes a DOTS client can convey to its DOTS server in the mitigation request, the mitigation status telemetry attributes a DOTS server can communicate to a DOTS client, and the mitigation efficacy telemetry attributes a DOTS client can communicate to a DOTS server. The telemetry attributes can assist the mitigator in choosing the DDoS mitigation techniques and performing optimal DDoS attack mitigation.</t>
              <t>This document specifies two YANG modules: one for representing DOTS telemetry message types and one for sharing the attack mapping details over the DOTS data channel.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9244"/>
          <seriesInfo name="DOI" value="10.17487/RFC9244"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="CAIDA" target="https://spoofer.caida.org/summary.php">
          <front>
            <title>State of IP Spoofing</title>
            <author>
              <organization/>
            </author>
            <date year="2023" month="September"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 368?>

<section numbered="false" anchor="Acknowledgements">
      <name>Acknowledgements</name>
      <t>Thanks to Linbo Hui, Yannan Hu, Wenyong Wang for their contribution to this draft.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
