S. Mcclure, J. Scambray, G. Kurtz, and K. , Hacking exposed: network security secrets and solutions, 2009.

S. Machiraju and R. H. Katz, Leveraging BGP Dynamics to Reverse-Engineer Routing Policies, 2006.

G. Siganos and M. Faloutsos, Analyzing BGP policies: methodology and tool, IEEE INFOCOM 2004, pp.1640-1651, 2004.
DOI : 10.1109/INFCOM.2004.1354576

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.10.3202

G. D. Battista, T. Erlebach, A. Hall, and M. Patrignani, Computing the Types of the Relationships Between Autonomous Systems, IEEE/ACM Transactions on Networking, vol.15, issue.2, pp.267-280, 2007.
DOI : 10.1109/TNET.2007.892878

L. Cittadini, G. D. Battista, M. Rimondini, and S. Vissicchio, Wheel + Ring = Reel: The Impact of Route Filtering on the Stability of Policy Routing, IEEE/ACM Transactions on Networking, vol.19, issue.4, pp.1085-1096, 2011.
DOI : 10.1109/TNET.2011.2106798

D. Guernsey, A. Engel, J. Butts, and S. Shenoi, Security Analysis of the MPLS Label Distribution Protocol, 2010.
DOI : 10.1007/978-3-642-16806-2_9

D. Grayson, D. Guernsey, J. Butts, M. Spainhower, and S. Shenoi, Analysis of security threats to MPLS virtual private networks, International Journal of Critical Infrastructure Protection, vol.2, issue.4, pp.146-153, 2009.
DOI : 10.1016/j.ijcip.2009.08.002

T. Bilski, Fluctuations and Lasting Trends of QoS on Intercontinental Links, Quality of Service in Heterogeneous Networks, pp.251-264, 2009.
DOI : 10.1007/978-3-642-10625-5_16

A. M. Alkahtani, M. E. Woodward, and E. Al-begain, An Overview of Quality of Service (QoS) and QoS Routing in Communication Networks, 4th PGNET2003 Symposium, pp.236-242, 2003.

B. Braden, D. Clark, and S. Shenker, Integrated service in the internet architecture: an overview, Program on Internet and Telecoms Convergence, 1994.
DOI : 10.17487/rfc1633

M. Spainhower, J. Butts, D. Guernsey, and S. Shenoi, Security analysis of RSVP-TE signaling in MPLS networks, International Journal of Critical Infrastructure Protection, vol.1, issue.1, pp.68-74, 2008.
DOI : 10.1016/j.ijcip.2008.08.005

C. Llorens and A. Serhrouchni, Security Verification of a Virtual Private Network over MPLS, Network Control and Engineering for QoS, Security, and Mobility IV, pp.339-353, 2007.
DOI : 10.1007/978-0-387-49690-0_27

F. Wang and L. Gao, On inferring and characterizing internet routing policies, Proceedings of the 3rd ACM SIGCOMM conference on Internet measurement, pp.15-26, 2003.
DOI : 10.1109/jcn.2007.6182869

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1026.2998

S. Ming, S. Wu, X. Zhao, and K. Zhang, On reverse engineering the management actions from observed BGP data, In: INFOCOM Workshops, pp.1-6, 2008.

M. Caesar and J. Rexford, BPG routing policies in ISP networks, IEEE Network, vol.19, issue.6, pp.5-11, 2005.
DOI : 10.1109/MNET.2005.1541715

R. Mahajan and T. Anderson, Understanding BGP misconfiguration, ACM SIGCOMM Computer Communication Review, vol.32, issue.4, pp.3-16, 2002.
DOI : 10.1145/964725.633027

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.20.1862

D. O. Awduchea and B. Jabbarib, Internet traffic engineering using multi-protocol label switching (MPLS), Computer Networks, vol.40, issue.1, pp.111-129, 2002.
DOI : 10.1016/S1389-1286(02)00269-4

. Isi and . Edu, The Network Simulator -ns-2, 2014.

F. Palmieri and U. Fiore, Securing the MPLS Control Plane, High Performance Computing and Communications, pp.511-523, 2005.
DOI : 10.1007/11557654_60

A. A. Al-mutairi and S. D. Wolthusen, A Security Analysis of MPLS Service Degradation Attacks Based on Restricted Adversary Models, In: Information Security in Diverse Computing Environments, 2014.
DOI : 10.4018/978-1-4666-6158-5.ch008