A. Ford, TCP Extensions for Multipath Operation with Multiple Addresses, 2013.
DOI : 10.17487/rfc6824

O. Bonaventure, C. Paasch, and G. , Use Cases and Operational Experience with Multipath TCP, 2017.
DOI : 10.17487/RFC8041

URL : http://hdl.handle.net/2078.1/162835

M. Boucadair, Extensions for Network-Assisted MPTCP Deployment Models " , draft-boucadair-mptcp-plain-mode-10, 2017.

M. Coudron, D. Nguyen, and S. Secci, Enhancing buffer dimensioning for Multipath TCP, 2016 7th International Conference on the Network of the Future (NOF), 2016.
DOI : 10.1109/NOF.2016.7810142

Q. Peng, A. Walid, and S. H. Low, Multipath TCP algorithms, ACM SIGMETRICS Performance Evaluation Review, vol.41, issue.1, pp.305-316, 2013.
DOI : 10.1145/2494232.2466585

C. Raiciu, Improving datacenter performance and robustness with multipath tcp, Comp. Commun. Rev, vol.41, issue.4, 2011.
DOI : 10.1145/2018436.2018467

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.221.6818

K. Witcher, Fiber Optics and Its Security Vulnerabilities, 2005.

M. Furdek and N. Skorin-kapov, Physical-Layer Attacks in Transparent Optical Networks, Optical Communications Systems, 2012.

K. Shaneman and S. Gray, Optical network security: technical analysis of fiber tapping mechanisms and methods for detection and prevention, IEEE MILCOM 2004. Military Communications Conference, 2004., 2004.
DOI : 10.1109/MILCOM.2004.1494884

J. S. White and A. W. Pilbeam, An analysis of coupling attacks in highspeed fiber optic networks, SPIE Defense, Security, and Sensing. International Society for Optics and Photonics, 2011.

M. Conti, N. Dragoni, and V. Lesyk, A Survey of Man In The Middle Attacks, IEEE Communications Surveys & Tutorials, vol.18, issue.3, pp.2027-2051
DOI : 10.1109/COMST.2016.2548426

A. Pilosov and T. Kapela, Stealing The Internet -An Internet-Scale Man In The Middle Attack 2008 (online): https, 2017.

S. Goldberg, Why is it taking so long to secure internet routing?, Communications of the ACM, vol.57, issue.10, pp.20-2033, 2014.
DOI : 10.1145/2659899

A. U. Sankar, B-Secure: A Dynamic Reputation System for Identifying Anomalous BGP Paths, Proc. of FICTA 2017

A. Greenberg, Hacker Redirects Traffic From 19 Internet Providers to Steal Bitcoins 2014 (online) https, 2017.

M. Alicherry and A. D. Keromytis, DoubleCheck: Multi-path verification against man-in-the-middle attacks, 2009 IEEE Symposium on Computers and Communications, 2009.
DOI : 10.1109/ISCC.2009.5202224

M. Bagnulo and M. Bagnulo, Threat Analysis for TCP Extensions for Multipath Operation with Multiple Addresses Analysis of Residual Threats and Possible Fixes for Multipath TCP (MPTCP), p.7430, 2011.

D. Y. Kim and H. K. Choi, Efficient design for secure multipath TCP against eavesdropper in initial handshake, 2016 International Conference on Information and Communication Technology Convergence (ICTC)
DOI : 10.1109/ICTC.2016.7763559

. Routeviews, University of Oregon Route View Projects 2017 (website ): http://www.routeviews.org (access, 2017.

R. V. Oliveira, The (In)Completeness of the Observed Internet AS-level Structure, IEEE/ACM Transactions on Networking, vol.18, issue.1, pp.109-122, 2010.
DOI : 10.1109/TNET.2009.2020798

L. Gao, On inferring autonomous system relationships in the internet, IEEE/ACM Trans. on Networking, vol.9, issue.6, pp.733-745, 2001.

T. Erlebach, Connectivity Measures for Internet Topologies on the Level of Autonomous Systems, Operations Research, vol.57, issue.4, pp.1006-1025, 2009.
DOI : 10.1287/opre.1080.0677

R. Klöti, Policy-compliant path diversity and bisection bandwidth, 2015 IEEE Conference on Computer Communications (INFOCOM)
DOI : 10.1109/INFOCOM.2015.7218436

B. Ager, Anatomy of a large European IXP, Proc. of ACM SIGCOMM 2012

G. and D. Battista, Computing the types of the relationships between autonomous systems, IEEE/ACM Trans. on Networking, vol.15, issue.2, pp.267-280, 2007.

R. Albert and A. Barabsi, Statistical mechanics of complex networks, Reviews of Modern Physics, p.47, 2002.
DOI : 10.1103/RevModPhys.74.47

M. Khne, Update on AS Path Lengths Over Time " (website): https:// labs.ripe.net/Members/mirjam/update-on-as-path-lengths-over-time (access, 2017.

M. Boucadair, Network-Assisted MPTCP: Use Cases, Deployment Scenarios and Operational Considerations " , draft-nam-mptcp- deployment-considerations-01, 2016.

M. Coudron, S. Secci, G. Pujolle, P. Raad, and P. Gallard, Cross-layer cooperation to boost multipath TCP performance in cloud networks, 2013 IEEE 2nd International Conference on Cloud Networking (CloudNet)
DOI : 10.1109/CloudNet.2013.6710558

URL : https://hal.archives-ouvertes.fr/hal-01216158

Y. Benchaib, D. Phung, and S. Secci, Transparent cloud access performance augmentation via an MPTCP-LISP connection proxy, 2015 ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS), 2015.
DOI : 10.1109/ANCS.2015.7110140

URL : https://hal.archives-ouvertes.fr/hal-01212799

E. Elena, J. Rougier, and S. Secci, Characterisation of AS-level path deviations and multipath in Internet routing, 6th EURO-NGI Conference on Next Generation Internet, 2010.
DOI : 10.1109/NGI.2010.5534468

X. Misseri, J. L. Rougier, and D. Saucez, Internet routing diversity for stub networks with a Map-and-Encap scheme, 2012 IEEE International Conference on Communications (ICC)
DOI : 10.1109/ICC.2012.6363982

URL : https://hal.archives-ouvertes.fr/hal-01267321

A. Lange, Issues in Revising BGP-4 " , draft-ietf-idr-bgp-issues Configuring BGP to Select Multiple BGP Paths, JUNOS 8.2 Routing Protocols Configuration Guide Chapter 33 'BGP Configuration Guidelines, pp.571-572, 2003.

M. Tuexen and R. Stewart, Stream Control Transmission Protocol (SCTP) Chunk Flags Registration, RFC, vol.6096, 2011.
DOI : 10.17487/rfc6096

K. Butler, A Survey of BGP Security Issues and Solutions, Proceedings of the IEEE, pp.100-122, 2010.
DOI : 10.1109/JPROC.2009.2034031

A. Cohen, Y. Gilad, A. Herzberg, and M. Schapira, Jumpstarting BGP Security with Path-End Validation, Proceedings of the 2016 conference on ACM SIGCOMM 2016 Conference, SIGCOMM '16
DOI : 10.1145/2934872.2934883