Latest Networking Research Papers July 2025 - BGP, RPKI, SAV, And More

by James Vasile 71 views

Hey guys! BasilGuo here, bringing you the latest and greatest from the world of networking research. This is your go-to spot for staying up-to-date with cutting-edge papers, especially if you're into the nitty-gritty of network protocols and security. Today, we're diving into the research published around July 27, 2025, focusing on areas like BGP, RPKI, SAV, and Source Address Validation. I've organized everything to make it super easy to find what interests you the most. So, grab a coffee, and let's jump in!

P.S. For an even better reading experience and to explore more papers, make sure to check out the Github page. You'll find all sorts of cool stuff there!

BGP

Let's kick things off with Border Gateway Protocol (BGP). This is the protocol that makes the internet work, routing traffic across different networks. We've got some fascinating papers here that dig into various aspects of BGP, from security to anomaly detection.

Title Date Comment
A Detailed Measurement View on IPv6 Scanners and Their Adaption to BGP Signals 2025-06-25
The Blind Spot of BGP Anomaly Detection: Why LSTM Autoencoders Fail on Real-World Outages 2025-06-21
BEAR: BGP Event Analysis and Reporting 2025-06-04
Ain't How You Deploy: An Analysis of BGP Security Policies Performance Against Various Attack Scenarios with Differing Deployment Strategies 2024-08-28
8 pag...

8 pages, 1 table, 8 figures, submitted to and accepted by IEEE ISNCC'24

Global BGP Attacks that Evade Route Monitoring 2024-08-19 10 pages
MAD-MulW: A Multi-Window Anomaly Detection Framework for BGP Security Events 2023-12-18 10 pages, 8 figures
BGP Typo: A Longitudinal Study and Remedies 2023-11-01
LIGHTYEAR: Using Modularity to Scale BGP Control Plane Verification 2023-09-20
12 pa...

12 pages (+ 2 pages references), 3 figures, Accepted at SIGCOMM '23

Live Long and Prosper:Analyzing Long-Lived MOAS Prefixes in BGP 2023-07-17
Oscilloscope: Detecting BGP Hijacks in the Data Plane 2023-01-30
BGP-Multipath Routing in the Internet 2022-05-29
38 pa...

38 pages, 8 figures, 8 tables

A Multi-View Framework for BGP Anomaly Detection via Graph Attention Network 2021-12-23 12 pages, 8 figures
AS-Level BGP Community Usage Classification 2021-10-07
Estimating the Impact of BGP Prefix Hijacking 2021-05-05
IFIP ...

IFIP Networking conference 2021

Performance Analysis of Multipath BGP 2021-03-29
IEEE ...

IEEE Global Internet (GI) Symposium 2021

Diving Deep into BGP Research

The Border Gateway Protocol (BGP) is the unsung hero of the internet, the crucial protocol that makes the internet work. Without it, routing traffic across the vast network of interconnected systems would be impossible. Recent research papers highlight critical aspects of BGP, focusing on its vulnerabilities, security enhancements, and performance optimizations. One paper, "A Detailed Measurement View on IPv6 Scanners and Their Adaption to BGP Signals," explores how IPv6 scanners interact with BGP signals, providing insights into network security and potential vulnerabilities. Another significant contribution is "The Blind Spot of BGP Anomaly Detection: Why LSTM Autoencoders Fail on Real-World Outages," which delves into the limitations of using LSTM autoencoders for detecting BGP anomalies in real-world scenarios. This research is essential for developing more robust anomaly detection methods.

Further studies such as "BEAR: BGP Event Analysis and Reporting" focus on tools and methodologies for analyzing and reporting BGP events, aiding network operators in quickly identifying and addressing issues. Security is a recurrent theme, with papers like "Ain't How You Deploy: An Analysis of BGP Security Policies Performance Against Various Attack Scenarios with Differing Deployment Strategies" examining the effectiveness of various BGP security policies under different attack scenarios. This research underscores the importance of strategic deployment of security measures to protect the internet's backbone. The paper Global BGP Attacks that Evade Route Monitoring