TCP Extensions for Multipath Operation with Multiple Addresses, 2013. ,
DOI : 10.17487/rfc6824
Use Cases and Operational Experience with Multipath TCP, 2017. ,
DOI : 10.17487/RFC8041
URL : http://hdl.handle.net/2078.1/162835
Extensions for Network-Assisted MPTCP Deployment Models " , draft-boucadair-mptcp-plain-mode-10, 2017. ,
Enhancing buffer dimensioning for Multipath TCP, 2016 7th International Conference on the Network of the Future (NOF), 2016. ,
DOI : 10.1109/NOF.2016.7810142
Multipath TCP algorithms, ACM SIGMETRICS Performance Evaluation Review, vol.41, issue.1, pp.305-316, 2013. ,
DOI : 10.1145/2494232.2466585
Improving datacenter performance and robustness with multipath tcp, Comp. Commun. Rev, vol.41, issue.4, 2011. ,
DOI : 10.1145/2018436.2018467
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.221.6818
Fiber Optics and Its Security Vulnerabilities, 2005. ,
Physical-Layer Attacks in Transparent Optical Networks, Optical Communications Systems, 2012. ,
Optical network security: technical analysis of fiber tapping mechanisms and methods for detection and prevention, IEEE MILCOM 2004. Military Communications Conference, 2004., 2004. ,
DOI : 10.1109/MILCOM.2004.1494884
An analysis of coupling attacks in highspeed fiber optic networks, SPIE Defense, Security, and Sensing. International Society for Optics and Photonics, 2011. ,
A Survey of Man In The Middle Attacks, IEEE Communications Surveys & Tutorials, vol.18, issue.3, pp.2027-2051 ,
DOI : 10.1109/COMST.2016.2548426
Stealing The Internet -An Internet-Scale Man In The Middle Attack 2008 (online): https, 2017. ,
Why is it taking so long to secure internet routing?, Communications of the ACM, vol.57, issue.10, pp.20-2033, 2014. ,
DOI : 10.1145/2659899
B-Secure: A Dynamic Reputation System for Identifying Anomalous BGP Paths, Proc. of FICTA 2017 ,
Hacker Redirects Traffic From 19 Internet Providers to Steal Bitcoins 2014 (online) https, 2017. ,
DoubleCheck: Multi-path verification against man-in-the-middle attacks, 2009 IEEE Symposium on Computers and Communications, 2009. ,
DOI : 10.1109/ISCC.2009.5202224
Threat Analysis for TCP Extensions for Multipath Operation with Multiple Addresses Analysis of Residual Threats and Possible Fixes for Multipath TCP (MPTCP), p.7430, 2011. ,
Efficient design for secure multipath TCP against eavesdropper in initial handshake, 2016 International Conference on Information and Communication Technology Convergence (ICTC) ,
DOI : 10.1109/ICTC.2016.7763559
University of Oregon Route View Projects 2017 (website ): http://www.routeviews.org (access, 2017. ,
The (In)Completeness of the Observed Internet AS-level Structure, IEEE/ACM Transactions on Networking, vol.18, issue.1, pp.109-122, 2010. ,
DOI : 10.1109/TNET.2009.2020798
On inferring autonomous system relationships in the internet, IEEE/ACM Trans. on Networking, vol.9, issue.6, pp.733-745, 2001. ,
Connectivity Measures for Internet Topologies on the Level of Autonomous Systems, Operations Research, vol.57, issue.4, pp.1006-1025, 2009. ,
DOI : 10.1287/opre.1080.0677
Policy-compliant path diversity and bisection bandwidth, 2015 IEEE Conference on Computer Communications (INFOCOM) ,
DOI : 10.1109/INFOCOM.2015.7218436
Anatomy of a large European IXP, Proc. of ACM SIGCOMM 2012 ,
Computing the types of the relationships between autonomous systems, IEEE/ACM Trans. on Networking, vol.15, issue.2, pp.267-280, 2007. ,
Statistical mechanics of complex networks, Reviews of Modern Physics, p.47, 2002. ,
DOI : 10.1103/RevModPhys.74.47
Update on AS Path Lengths Over Time " (website): https:// labs.ripe.net/Members/mirjam/update-on-as-path-lengths-over-time (access, 2017. ,
Network-Assisted MPTCP: Use Cases, Deployment Scenarios and Operational Considerations " , draft-nam-mptcp- deployment-considerations-01, 2016. ,
Cross-layer cooperation to boost multipath TCP performance in cloud networks, 2013 IEEE 2nd International Conference on Cloud Networking (CloudNet) ,
DOI : 10.1109/CloudNet.2013.6710558
URL : https://hal.archives-ouvertes.fr/hal-01216158
Transparent cloud access performance augmentation via an MPTCP-LISP connection proxy, 2015 ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS), 2015. ,
DOI : 10.1109/ANCS.2015.7110140
URL : https://hal.archives-ouvertes.fr/hal-01212799
Characterisation of AS-level path deviations and multipath in Internet routing, 6th EURO-NGI Conference on Next Generation Internet, 2010. ,
DOI : 10.1109/NGI.2010.5534468
Internet routing diversity for stub networks with a Map-and-Encap scheme, 2012 IEEE International Conference on Communications (ICC) ,
DOI : 10.1109/ICC.2012.6363982
URL : https://hal.archives-ouvertes.fr/hal-01267321
Issues in Revising BGP-4 " , draft-ietf-idr-bgp-issues Configuring BGP to Select Multiple BGP Paths, JUNOS 8.2 Routing Protocols Configuration Guide Chapter 33 'BGP Configuration Guidelines, pp.571-572, 2003. ,
Stream Control Transmission Protocol (SCTP) Chunk Flags Registration, RFC, vol.6096, 2011. ,
DOI : 10.17487/rfc6096
A Survey of BGP Security Issues and Solutions, Proceedings of the IEEE, pp.100-122, 2010. ,
DOI : 10.1109/JPROC.2009.2034031
Jumpstarting BGP Security with Path-End Validation, Proceedings of the 2016 conference on ACM SIGCOMM 2016 Conference, SIGCOMM '16 ,
DOI : 10.1145/2934872.2934883