How does Bright Data ensure Network Security?
Most of the traffic that goes through both a regular ISP and a virtual ISP is encrypted with an SSL tunnel so its content is not visible to the ISP. Due to this the methods to secure the network and prevent illegal activities available to ISPs are limited and are mostly targeted at large scale DDoS prevention and domain blacklists. However at Bright Data we do a lot more:
Element | Bright Data Virtual ISP | Regular ISP |
---|---|---|
Requires registration | Yes | Yes |
Requires payment method | Yes | Yes |
Methods and procedures for reporting abuse | Yes | Yes |
Online DDoS detection | Yes | Yes |
Full block of the most popular DDoS methods 2 | Yes | No |
KYC procedure per customer | Yes | No |
Compliance alert if customer starts targeting domains not reported during KYC | Yes | No |
Deploy active blocks for Ad frauds, fake reviews, fake likes, fake account creations, spamming, etc | Yes1 | No |
Block service level abuse or attack with non web traffic 3 | Yes | No |
Bottom line
Bright Data virtual ISP network is much safer and less likely to be used for attacks and abuse than a regular ISP.
Bright Data does not allow using its products and systems to render any network resource unavailable to its intended users, including, without limitation, via Denial-of-Service (DoS) or Distributed Denial-of-Service (DDoS) attack
1: Applied to 30% of the traffic and planned to reach > 90% by end of 2022
2: Methods that were used in the top 90% of DDoS attacks of 2021: UDP fragmentation, DNS reflection, UDP volumetric, LDAP reflection, DNS query, NTP reflection, ICMP (volumetric),
3: Non web traffic is any traffic that is not HTTP protocol or targeting ports different from the standard HTTP ports of
80/443
.Was this page helpful?