
Secure IP Address Allocation at Cloud Scale
Eric Pauley∗‡, Kyle Domico∗, Blaine Hoak∗, Ryan Sheatsley∗, Quinn Burke∗,
Yohan Beugin∗, Engin Kirda†, Patrick McDaniel∗
∗University of Wisconsin–Madison
‡Email: epauley@cs.wisc.edu
†Northeastern University
Abstract—Public clouds necessitate dynamic resource alloca-
tion and sharing. However, the dynamic allocation of IP addresses
can be abused by adversaries to source malicious traffic, bypass
rate limiting systems, and even capture traffic intended for other
cloud tenants. As a result, both the cloud provider and their
customers are put at risk, and defending against these threats
requires a rigorous analysis of tenant behavior, adversarial
strategies, and cloud provider policies. In this paper, we develop
a practical defense for IP address allocation through such an
analysis. We first develop a statistical model of cloud tenant
deployment behavior based on literature and measurement of
deployed systems. Through this, we analyze IP allocation policies
under existing and novel threat models. In response to our
stronger proposed threat model, we design IP scan segmentation,
an IP allocation policy that protects the address pool against
adversarial scanning even when an adversary is not limited
by number of cloud tenants. Through empirical evaluation on
both synthetic and real-world allocation traces, we show that
IP scan segmentation reduces adversaries’ ability to rapidly
allocate addresses, protecting both address space reputation and
cloud tenant data. In this way, we show that principled analysis
and implementation of cloud IP address allocation can lead to
substantial security gains for tenants and their users.
I. INTRODUCTION
Cloud providers allow near limitless scalability to tenants
while reducing or eliminating upfront costs. One component
that enables this architecture is the reuse of scarce IPv4
addresses across tenants as services scale. Though a practical
necessity, this reuse–combined with the use of IP addresses
as a security principal–enables malicious cloud tenants to
abuse IP address reputation [1]–[3], pollute the address space
for future tenants [4], and even collect sensitive information
intended for previous tenants [5]–[7]. We observe that these
seemingly disparate attack spaces share a common thread: the
ability of adversaries to easily sample large numbers of IP
addresses from provider pools.
While prior works have identified and confirmed the issue
of IP address reuse, and proposed some preliminary mitiga-
tions [6], [7], the community still lacks a complete under-
standing of the security provided by these measures, especially
against a more powerful or adaptive adversary. For instance,
prior works that attempt to reassign addresses to the same
tenant can be defeated by adversaries using many disconnected
cloud accounts (a form of Sybil attack). Developing secure
policies for IP address allocation necessitates a fine-grained
analysis of tenant behaviors and adversarial strategies. Such
an analysis, and the stronger defenses that analysis enables,
are the key focus of this work.
Towards this goal, we propose a novel, comprehensive
model for IP address allocation on public clouds. By con-
sidering realistic distributions of benign tenant behaviors,
configuration management, and cloud provider allocation poli-
cies, our new model enables us to concretely evaluate the
effectiveness of attacks against the address pool. Implemented
in the Elastic IP Simulator (EIPSIM), tenant and adversarial
behaviors enable the key goal of our work: developing new
allocation strategies that reduce the ability of adversaries to
allocate, measure, and exploit many IP addresses. Our model
is validated via real-world data on cloud tenant allocations,
as well as data collected on cloud configuration management
practices and discussions with major cloud providers. In this
way, our model enables the development of new defenses
against a broad class of attacks against cloud services.
Our model enables us to characterize and defend against
a stronger adversary than considered in prior work. This
adaptive adversary performs a Sybil attack against the cloud
provider, creating many accounts to continually allocate new
IP addresses from the pool. Hence, this attacker effectively
defeats the protections provided by prior works. We propose
IP scan segmentation, a novel IP allocation policy that heuristi-
cally identifies adversarial behavior across many cloud tenants,
and effectively segments the pool to prevent such adversaries
from allocating many unique IPs and exploiting vulnerabilities.
We use EIPSIM to evaluate the security properties (i.e.,
adversarial ability to discover unique IPs and exploitable
configurations) of our studied allocation policies and ten-
ant/adversarial behaviors in real cloud settings. Our analysis,
spanning over 250 years of simulated IP address allocation,
highlights the marked impact of IP allocation policies on
the exploitability of IP address reuse. Indeed, our analysis
shows that IP scan segmentation reduces adversarial success
by 83.8 % over the IP allocation policies deployed by cloud
providers, and by 70.1 % compared to prior explored tech-
niques. Because our model concretely parallels the actual
behavior of cloud providers and tenants, the techniques studied
in this work can be directly implemented by providers to
protect their customers and network resources. We have shared
our findings with providers and release our models and policies
Network and Distributed System Security (NDSS) Symposium 2025
23 - 28 February 2025, San Diego, CA, USA
ISBN 979-8-9894372-8-3
https://dx.doi.org/10.14722/ndss.2025.23374
www.ndss-symposium.org
arXiv:2210.14999v2 [cs.CR] 10 Sep 2024