B. Ager, N. Chatzis, A. Feldmann, N. Sarrar, S. Uhlig et al., Anatomy of a large european IXP, ACM SIGCOMM 689, vol.688, 2012.

. Conference, . Helsinki, and -. Finland, , pp.163-174, 2012.


R. Albert and A. Barabási, Statistical mechanics of complex net-693 works, 2001.

A. Pilosov and T. Kapela, Stealing the internet -an internet-scale man 696 in the middle attack, vol.697, 2017.

, AS-level Topology Archive, 2015. As-level topology

M. Bagnulo, Threat analysis for tcp extensions for multi-702 path operation with multiple addresses. RFC 6181, 2011.

M. Bagnulo, C. Paasch, F. Gont, O. Bonaventure, and C. Raiciu, Analysis of residual threats and possible fixes for multipath tcp 706 (mptcp), 2015.

T. Bates, P. Smith, and G. Huston, , 2017.

D. Behaghel, S. Secci, S. Vinapamula, S. Seo, W. Cloetens et al., , p.711

U. Contreras, L. Peirens, and B. , Extensions for network-712 assisted mptcp deployment models, vol.713, 2017.

Y. Benchaïb, S. Secci, and C. Phung, Transparent cloud access per-716 formance augmentation via an MPTCP-LISP connection proxy, Pro-717 ceedings of the Eleventh ACM/IEEE Symposium on Architectures for 718 networking and communications systems, p.719, 2015.


M. Boucadair, C. Jacquenet, O. Bonaventure, W. Henderickx, and . Skog, , p.722

R. , Network-assisted mptcp: Use cases, deployment 723 scenarios and operational considerations, vol.724, 2016.

, Greg's cable map, vol.727, 2017.

, Archipelago (ark) measurement, CAIDA, 2017.

. Cisco, Bgp best path selection algorithm. Cisco guide, Trou-731 bleshooting tech notes, p.13753, 2016.

Q. D. Coninck and O. Bonaventure, Multipath QUIC: design and, 2017.

M. Conti, N. Dragoni, and V. Lesyk, A survey of man in the mid-740 dle attacks, IEEE Communications Surveys and Tutorials, vol.18, issue.3, 2016.

X. Corbillon, R. Aparicio-pardo, N. Kuhn, G. Texier, and G. Simon, Cross-layer scheduler for video streaming over MPTCP, Pro-745 ceedings of the 7th International Conference on Multimedia Systems, vol.744, p.746
URL : https://hal.archives-ouvertes.fr/hal-01310300

, MMSys, vol.7, 2016.

M. Coudron, H. D. Nguyen, and S. Secci, Enhancing buffer di-749 mensioning for multipath TCP, 7th International Conference on 750 the Network of the Future, NOF 2016, pp.1-7, 2016.


M. Coudron, S. Secci, G. Maier, G. Pujolle, and A. Pattavina, , 2013.

, Boosting cloud communications through a crosslayer multipath protocol 755 architecture, IEEE SDN for Future Networks and Services, vol.756, issue.SDN4FNS, pp.1-8, 2013.

M. Coudron, S. Secci, G. Pujolle, P. Raad, and P. Gallard, Cross-758 layer cooperation to boost multipath TCP performance in cloud net-759 works, IEEE 2nd International Conference on Cloud Networking, p.760, 2013.

, CloudNet, pp.761-58, 2013.


. Cyclops, Cyclops, vol.764, 2017.

D. Battista, G. Erlebach, T. Hall, A. Patrignani, M. Pizzonia et al., , p.766

T. Schank, Computing the types of the relationships between 767 30 autonomous systems, IEEE/ACM Trans. Netw, vol.15, issue.2, 2007.

E. Elena, J. Rougier, and S. Secci, Characterisation of as-level path 770 deviations and multipath in internet routing, Next Generation In-771 ternet (NGI), 2010 6th EURO-NF Conference on, pp.1-7, 2010.


T. Erlebach, L. S. Moonen, F. C. Spieksma, and D. Vukadinovic, , 2009.

, Connectivity measures for internet topologies on the level of autonomous 776 systems, Operations Research, vol.57, issue.4, pp.1006-1025


A. Ford, C. Raiciu, M. Handley, and O. Bonaventure, Tcp 779 extensions for multipath operation with multiple addresses, 2013.

A. Frömmgen, A. Rizk, T. Erbshäußer, M. Weller, and B. Koldehofe, , p.783

A. J. Buchmann and R. Steinmetz, A programming model for 784 application-defined multipath TCP scheduling, Proceedings of the 785 18th ACM/IFIP/USENIX Middleware Conference, p.786, 2017.


V. Fuller and D. Farinacci, Locator/id separation protocol (lisp) 789 map-server interface. RFC 6833, RFC Editor, vol.790, 2013.

M. Furdek and N. Skorin-kapov, Physical-layer attacks 792 in transparent optical networks, 2012.

, systems/physical-layer-attacks-in-transparent-optical-networks

L. Gao, On inferring autonomous system relationships in the 796 internet, IEEE/ACM Trans. Netw, vol.9, issue.6, pp.733-745, 2001.


S. Goldberg, Why is it taking so long to secure internet routing? Hong Kong, pp.675-683, 2014.


M. Kühne, Update on as path lengths over time, vol.834, 2012.

A. Lange, Issues in revising bgp-4. Internet-draft, vol.837, 2012.

M. Li, A. Lukyanenko, Z. Ou, A. Ylä-jääski, S. Tarkoma et al., , p.840

M. Secci and S. Fourthquarter, Multipath transmission for the inter-841 net: A survey, IEEE Communications Surveys Tutorials, vol.18, issue.4, pp.2887-842, 2016.

. Lip6-mptcp, , 2017.

X. Misseri, J. Rougier, and D. Saucez, Internet routing diversity for 846 stub networks with a map-and-encap scheme, Proceedings of IEEE 847 International Conference on Communications, p.848, 2012.

. Canada, , pp.2861-2866, 2012.


H. D. Nguyen, C. Phung, S. Secci, B. Felix, and M. Nogueira, , 2017.

, Can MPTCP secure internet communications from man-in-the-middle 852 attacks? In: Conference on Network and Service Management, vol.853, pp.1-7, 2017.


O. Bonaventure, C. Paasch, and G. , Use cases and operational 856 experience with multipath tcp, RFC, vol.8041, 2017.

R. V. Oliveira, D. Pei, W. Willinger, B. Zhang, and L. Zhang, The 859 (in)completeness of the observed internet as-level structure, IEEE/ACM, 2010.

, Trans. Netw, vol.18, issue.1, pp.109-122


Q. Peng, A. Walid, and S. H. Low, Multipath TCP algorithms: the, 2013.

C. Raiciu, S. Barré, C. Pluntke, A. Greenhalgh, D. Wischik et al., Improving datacenter performance and robustness with 869 multipath TCP, Proceedings of the ACM SIGCOMM, 2011.

, ference on Applications, Technologies, Architectures, and Protocols for, p.871

, Computer Communications, vol.872, pp.266-277, 2011.


C. Raiciu, C. Paasch, S. Barre, A. Ford, M. Honda et al., , vol.875

O. Bonaventure and M. Handley, How hard can it be? designing 876 and implementing a deployable multipath tcp, Proceedings of the 877 9th USENIX Conference on Networked Systems Design and Implemen-878 tation. NSDI'12. USENIX Association, vol.879, pp.29-29, 2012.

. Ripe-ris, Ripe routing information service, 2017.

. Routeviews, University of oregon route view projects, vol.884, 2017.

A. U. Sankar, P. Poornachandran, A. Ashok, and M. R. Krishnan, , p.886

P. Hrudya, B-secure: A dynamic reputation system for identi-887 fying anomalous BGP paths, Proceedings of the 5th International, vol.888, 2016.

, Conference on Frontiers in Intelligent Computing: Theory and Applica-889 tions -FICTA 2016, vol.1, pp.767-775


K. Shaneman and S. Gray, Optical network security: Technical anal-892 ysis of fiber tapping mechanisms and methods for detection and preven-893 tion, Proceedings of the IEEE MILCOM, pp.711-716, 2004.

N. Starosielski, D. Yoo, R. Leong, and K. Camacho, Critical nodes, 895 cultural networks: Re-mapping guam's cable infrastructure, Amerasia, vol.896, issue.3, pp.18-27, 2011.


A. Toonk, Bgpstream and the curious case of as12389, 2017.

M. Tuexen and R. Stewart, Stream control transmission protocol 901 (sctp) chunk flags registration. RFC 6096, RFC Editor, vol.902, 2011.

, Standard country or area codes for statistical use (m49), 2017.

J. White and A. Pilbeam, An analysis of coupling attacks in high-906 speed fiber optic networks, Proceedings of the Enabling Photonics 907 Technologies for Defense, Security, and Aerospace Applications VII, 2011.

K. Witcher, Extensions for Network-Assisted MPTCP Deploy-909 ment Models. White Paper, SANS Institute, 2005.