How does Bright Data ensure network security?

Support Account
Support Account
  • Updated

Most of the traffic that goes through both a regular ISP and a virtual ISP is encrypted with an SSL tunnel so its content is not visible to the ISP. Due to this the methods to secure the network and prevent illegal activities available to ISPs are limited and are mostly targeted at large scale DDoS prevention and domain blacklists. However at Bright Data we do a lot more:

Element Bright Data Virtual ISP Regular ISP
Requires registration Yes Yes
Requires payment method Yes Yes
Methods and procedures for reporting abuse Yes Yes
Online DDoS detection Yes Yes
Full block of the most popular DDoS methods (*2) Yes No
KYC procedure per customer Yes No
Compliance alert if customer starts targeting domains not reported during KYC Yes No
Deploy active blocks for Ad frauds, fake reviews, fake likes, fake account creations, spamming, etc Yes(*1) No
Block service level abuse or attack with non web traffic (*3) Yes No
  • *1 - Applied to 30% of the traffic and planned to reach >90% by end of 2022
  • *2 - Methods that were used in the top 90% of DDoS attacks of 2021: UDP fragmentation, DNS reflection, UDP volumetric, LDAP reflection, DNS query, NTP reflection, ICMP (volumetric),
  • *3 - Non web traffic is any traffic that is not HTTP protocol or targeting ports different from the standard HTTP ports of 80/443.


Bottom line, Bright Data virtual ISP network is much safer and less likely to be used for attacks and abuse than a regular ISP.

Bright Data does not allow using its products and systems to render any network resource unavailable to its intended users, including, without limitation, via "Denial-of-Service (DoS)" or "Distributed Denial-of-Service (DDoS)" attack

 

Share this

Was this article helpful?

0 out of 0 found this helpful