| With the widespread application of network, especially in the financial, business, government agencies, military, information processing, and industrial process control and other aspects, the status of the network has become increasingly important. Meanwhile, the requirements and reliance on the network of businesses and users are also growing.Telecommunication networks, which is an important national information infrastructure and the nerve center of national information and communication, plays a very important role in modern society. Therefore, the use of an open network environment for global communication has become the development trend of the times.However, when the network provides convenient resources, it also brings many kind of security risk. If the designer of network system doesn’t not well considers security management issues, the network system is very dangerous. If due to the decline of the network performance, and even safety fault caused by network paralysis, the enterprises will suffer serious losses, even worse is that such losses may be far greater than the investment on the network software and hardware at the beginning of the establishment of network system.Therefore, the problem of network security becomes more and more serious.An effective, practical network always inseparable from the network management. Network information security and how to manage the telecommunication business has gradually become the key problem in the development of firms.whether it is for network administrators, web application developers, or an ordinary Internet users, a high safety, high efficiency, high quality network is particularly necessary. And of course,a better network management pattern can provide more security services to customers.Therefore, this article on Telecommunications internal security vulnerabilities and attacks detection has important practical significance,and the enterprise managers and users should attach importance to the performance of the network, thus preventing the harm brought by internal security vulnerabilities and attacks. In this paper, we firstly analyze telecom network security situation,and then,we study the telecommunication internal security holes forms and characteristics comprehensively from the aspects of CVE, the traditional telecommunication network, mobile wireless access, the NGN network protocol. On this basis for these flaws, we analyzes the attacks behaviors and adopt compound attack and prediction algorithm to detect the attacks.At last, according the analysis above,we establish information security management system (ISMS), in order to prevent the harm brought by Telecommunications internal security vulnerabilities and attacks.This thesis consists of Figure17,Table33,Reference31. |