Application of IDP (Intrusion detection and prevention) system:

This is the new Intrusion Detection and Prevention System technology which helps in protecting both the application and network layers from existing and future threats. Intrusion detection and prevention system makes in-depth scrutiny of all the packets in communication traffic to identify different types of doubtful activities and lawful threats/risks at both the layers (Anonymous, 2006). This technique helps a lot in recognizing, Back-door detection, Regular expression pattern matching and Attack signatures etc.

When compared to other traditional firewalls that are very prone to false signals, low efficiency, high cost and incapacity to face threats/risks. On the other hand, this system can also be useful to destroy certain risks and certain flag, doubtful items. In addition to these, the IDP system in Juniper networks came out with a new technology to maintain high level of security and control.

Installation of Gateways (Application Level Gateways- ALGs):

Application Level Gateways helps in maintaining the security by putting on and off of the firewall pinholes. These gateways are designed in such a manner to prevent unexpected attacks either on VoIP or other IP network. In addition to the above benefits, these gateways are capable enough to read and interpret messages and then act as appropriate. Because of these facilities, ALGs are used to see the set-up messages to decide between legal and piracy ones (P.67). Normally, these ALGs will be embedded into the security devices like firewalls to upgrade their performance and capacity for applications. With regard to VoIP, H323, SIP, MGCP are some of the protocols.

Implementation of SIP in terms of Authorisation, Authentication and IPSec:

SIP could be understood as a vital part in relation to VoIP in terms of providing call transfer, call set-up, call ID, call transmission, call processing, call waiting, and so many advance features. For the beginners, Hypertext Transfer Protocol (HTTP) and simple Mail TRANSFER Protocol (SMPT) are the two other protocols in use which allows SIP to easily monitor or spoof (Griffith, D.,2004). Now-a-days, network managers are coming across different types of threats such as SPIT, unauthorised call transfers and access to information etc. All the above threats can overcome by strong and valid authentication, authorisation and IPSec.

Download Intrusion Detection and Prevention System PPT