P. Biondi, Scapy. http://www.secdev.org/projects, 2009.

V. J. Bono, 7007 Explanation and Apology, 1997.

K. Butler, T. Farley, P. Mcdaniel, and J. Rexford, A Survey of BGP Security Issues and Solutions, Proceedings of the IEEE, vol.98, issue.1, 2008.
DOI : 10.1109/JPROC.2009.2034031

H. Chan, D. Dash, A. Perrig, and H. Zhang, Modeling adoptability of secure BGP protocol, ACM SIGCOMM Computer Communication Review, vol.36, issue.4, p.290, 2006.
DOI : 10.1145/1159913.1159946

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

L. Colitti, Active BGP Probing, 2009.
DOI : 10.1016/j.micpro.2007.05.001

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

S. Convery and M. Franz, BGP Vulnerability Testing: Separating Fact from FUD, p.28, 2003.

V. Gill, J. Heasley, and D. Meyer, The Generalized TTL Security Mechanism (GTSM), RFCExperimental), vol.3682, 2004.
DOI : 10.17487/rfc5082

G. Goodell, W. Aiello, T. Griffin, J. Ioannidis, P. Mcdaniel et al., Working around BGP: An incremental approach to improving security and accuracy of interdomain routing, Proc. NDSS, 2003.

A. Heffernan, Protection of BGP Sessions via the TCP MD5 Signature Option, RFC, vol.2385, 1998.
DOI : 10.17487/rfc2385

N. James, Extensions to BGP to support secure origin BGP (sobgp). Network Working Group, 2002.

S. Kent, C. Lynn, and K. Seo, Design and analysis of the Secure Border Gateway Protocol (S-BGP), Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00, 2000.
DOI : 10.1109/DISCEX.2000.824939

G. Lyon, Nmap ? Free Security Scanner For Network Exploration & Security Audits, 2009.

R. Mahajan, D. Wetherall, and T. Anderson, Understanding BGP misconfiguration, Proceedings of the 2002 conference on Applications, technologies, architectures, and protocols for computer communications, pp.3-16, 2002.
DOI : 10.1145/633025.633027

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

C. Mcarthur and M. Guirguis, Stealthy IP Prefix Hijacking: Don't Bite Off More Than You Can Chew, GLOBECOM 2009, 2009 IEEE Global Telecommunications Conference, 2008.
DOI : 10.1109/GLOCOM.2009.5425977

O. Nordström and C. Dovrolis, Beware of BGP attacks, ACM SIGCOMM Computer Communication Review, vol.34, issue.2, pp.1-8, 2004.
DOI : 10.1145/997150.997152

A. Oppermann and C. Jeker, BGPDNS, Using BGP topology information for DNS RR sorting a scalable way of multi-homing, 2002.

A. Pilosov and T. Kapela, Stealing The Internet, 2009.

A. Ramachandran and N. Feamster, Understanding the network-level behavior of spammers, ACM SIGCOMM Computer Communication Review, vol.36, issue.4, p.302, 2006.

Y. Rekhter, T. Li, and S. Hares, BGP-4) RFC 4271 (Draft Standard), A Border Gateway Protocol, vol.4, 2006.

K. Sriram, D. Montgomery, O. Borchert, O. Kim, and D. Kuhn, Study of BGP Peering Session Attacks and Their Impacts on Routing Performance, IEEE Journal on Selected Areas in Communications, vol.24, issue.10, p.1901, 2006.
DOI : 10.1109/JSAC.2006.877218

C. Villamizar, R. Chandra, and R. Govindan, BGP Route Flap Damping, RFC 2439 (Proposed Standard), 1998.
DOI : 10.17487/rfc2439

P. Watson, Slipping in the Window, TCP Reset attacks, 2004.