The ACM SIGCOMM 2018 is one of the biggest annual conferences of the ACM Special Interest Group on Data Communication (SIGCOMM) on the applications, technologies, architectures, and protocols for computer communication. SIGCOMM members include educators, students, scientists, etc., studying all aspects of computer communications and networks (i.e., analysis, technical design, engineering, measurement, and management). The ACM SIGCOMM 2018 was held in Budapest, Hungary on August 20-25, 2018.
In this edition, three demos from INTRIG research group were accepted for the ACM SIGCOMM 2018 Posters, Demos, and Student Research Competition. The three works were demoed there and were well received by fellow researchers.
- Fabricio Rodriguez presented the demo “BB-Gen: A Packet Crafter for P4 Target Evaluation” [video][poster], which is a packet crafter and table generator tool that given a P4 application and a corresponding user configuration results in packet and table traces to carry automated performance evaluation tasks. We demonstrate BB-Gen with P4 applications of increasing complexity (from L2 to VXLAN-based Data Center Gateway), using two different multi-architecture backend compilers (MACSAD, T4P4S) and different targets. This open-source tool is available in GitHub (here).
- Raphael Vicente Rosa presented the demo “Blockchain-based Decentralized Applications meet Multi-Administrative Domain Networking” [video][poster], This demo showcases an experimental prototype based on best of breed open source components (e.g., Ethereum, OVS, Neo4j, Ryu/OpenFlowv1.3, ARIA/TOSCA) illustrating blockchain Decentralized Application (DApp) functionalities for life cycle management of multi-administrative domain network services.
- Levente Csikor presented the demo “Policy Injection: A Cloud Dataplane DoS Attack” [video][poster], a novel algorithmic complexity attack that enables a tenant to add specially tailored ACLs into the data center fabric to mount a denial-of-service attack through exploiting the built-in security mechanisms of the cloud management systems (CMS). We show how a tenant can inject seemingly harmless ACLs into the cloud data plane to abuse an algorithmic deficiency in the most popular cloud hypervisor switch, Open vSwitch, and reduce its effective peak performance by 80-90%, and, in certain cases, denying network access altogether.