S. Kent and K. Seo, Security architecture for the internet protocol, IETF Request For Comments RFC, vol.4301, 2005.

S. Kent, IP encapsulating security payload (ESP), " IETF Request For Comments RFC 4303, 2005.
DOI : 10.17487/rfc4303

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.359.4556

J. Mogul and S. Deering, Path mtu discovery IETF Request For Comments 1191, 1990.

M. Luckie, K. Cho, and B. Owens, Inferring and debugging path MTU discovery failures, Proceedings of the 5th ACM SIGCOMM conference on Internet measurement , IMC '05, 2005.
DOI : 10.1145/1330107.1330129

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.102.1183

M. Luckie and B. Stasiewicz, Measuring path MTU discovery behaviour, Proceedings of the 10th annual conference on Internet measurement, IMC '10, 2010.
DOI : 10.1145/1879141.1879155

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.397.1064

S. Kent, IP authentication header IETF Request For Comments RFC 4302, 2005.
DOI : 10.17487/rfc4302

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.172.3803

C. Kaufman, P. Hoffman, Y. Nir, and P. Eronen, Internet key exchange protocol version 2 (IKEv2), IETF Request For Comments RFC, vol.5996, 2010.
DOI : 10.17487/rfc5996

N. Egi, M. Dobrescu, J. Du, K. Argyraki, B. Chun et al., Understanding the packet Processing Capabilities of Multicore Servers, 2009.

M. Dobrescu, N. Egi, K. Argyraki, B. Chun, K. Fall et al., RouteBricks, Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles, SOSP '09, 2009.
DOI : 10.1145/1629575.1629578

L. Jacquin, V. Roca, M. A. Kaafar, F. Schuler, and J. Roch, IBTrack: An ICMP black holes tracker, 2012 IEEE Global Communications Conference (GLOBECOM), 2012.
DOI : 10.1109/GLOCOM.2012.6503545

URL : https://hal.archives-ouvertes.fr/hal-00748153

M. Mathis and J. W. Heffner, Packetization layer path mtu discovery, IETF Request For Comments RFC, vol.4821, 2007.
DOI : 10.17487/rfc4821

F. Gont, ICMP attacks against TCP, IETF Request For Comments RFC, vol.5927, 2010.
DOI : 10.17487/rfc5927

J. P. Degabriele and K. G. Paterson, Attacking the IPsec Standards in Encryption-only Configurations, 2007 IEEE Symposium on Security and Privacy (SP '07), 2007.
DOI : 10.1109/SP.2007.8

J. Degabriele and K. G. Paterson, On the (in)security of IPsec in MAC-then-encrypt configurations, Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, 2010.
DOI : 10.1145/1866307.1866363

C. B. Mccubbin, A. A. Selçuk, and D. P. Sidhu, Initialization vector attacks on the IPsec protocol suite, Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000), 2000.
DOI : 10.1109/ENABL.2000.883723

V. Nikov, A DoS Attack Against the Integrity-Less ESP (IPSec), IACR Cryptology ePrint Archive, 2006.

S. Northcutt and J. Novak, Network Intrusion Detection, Third Edition, 2002.

F. A. Barbhuiya, S. Roopa, R. Ratti, S. Biswas, and S. Nandi, An Active Detection Mechanism for Detecting ICMP Based Attacks, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, 2012.
DOI : 10.1109/TrustCom.2012.68

J. Mccann, S. Deering, and J. Mogul, Path mtu discovery for ip version 6 IETF Request For Comments, 1981.

F. Gont, G. Gont, and C. Pignataro, Recommendations for filtering ICMP messages, IETF Working Document, 2013.