Uhingen, Baden-Württemberg, Deutschland
2335 Follower:innen
500+ Kontakte
Info
Artikel von Thilo Ewald
Aktivitäten
-
🚀 Great to share the latest blog from our partner Google Cloud: “Autonomous Network Operations Framework: Unlock Predictable and High-Performing…
🚀 Great to share the latest blog from our partner Google Cloud: “Autonomous Network Operations Framework: Unlock Predictable and High-Performing…
Beliebt bei Thilo Ewald
-
🚀 Be part of our i14y Lab 𝐒𝐮𝐦𝐦𝐢𝐭 – where innovation meets interoperability! Haven’t registered yet? This is your reminder to secure your spot…
🚀 Be part of our i14y Lab 𝐒𝐮𝐦𝐦𝐢𝐭 – where innovation meets interoperability! Haven’t registered yet? This is your reminder to secure your spot…
Beliebt bei Thilo Ewald
-
Red Hat telco team is heading to Düsseldorf for the AI-Native Telco Forum, Oct 23–24! Join us to explore how telcos are putting AI into action — from…
Red Hat telco team is heading to Düsseldorf for the AI-Native Telco Forum, Oct 23–24! Join us to explore how telcos are putting AI into action — from…
Beliebt bei Thilo Ewald
Berufserfahrung und Ausbildung
Bescheinigungen und Zertifikate
-
Machine Learning for Telecom Customers Churn Prediction
Coursera Project Network
Veröffentlichungen
-
Experiences with large-scale operational trials of ALTO-enhanced P2P filesharing in an intra-ISP scenario
Peer-to-Peer Networking and Applications
Application Layer Traffic Optimization (ALTO) has recently gained attention in the research and standardisation community as a way for a network operator to guide the peer selection process of distributed applications by providing network layer topology information. In particular P2P applications are expected to gain from ALTO, due to the many connections peers form among each other, often without taking network layer topology information into account. In this paper, we present results of an…
Application Layer Traffic Optimization (ALTO) has recently gained attention in the research and standardisation community as a way for a network operator to guide the peer selection process of distributed applications by providing network layer topology information. In particular P2P applications are expected to gain from ALTO, due to the many connections peers form among each other, often without taking network layer topology information into account. In this paper, we present results of an extensive intra-ISP trial with an ALTO-enhanced P2P filesharing software. In summary, our results show that—depending on the concrete setting and on the distribution of upload capacity in the network—ALTO enables an ISP to save operational costs significantly while not degrading application layer performance noticeably. In addition, based on our experience we are able to give advice to operators on how to save costs with ALTO while not sacrificing application layer performance at all.
Andere Autor:innenVeröffentlichung anzeigen -
Capturing Cloud Computing Knowledge and Experience in Patterns
IEEE CLOUD 2012
The industry-driven evolution of cloud computing tends to obfuscate the common underlying architectural concepts of cloud offerings and their implications on hosted applications. Patterns are one way to document such architectural principles and to make good solutions to reoccurring (architectural) cloud challenges reusable. To capture cloud computing best practice from existing cloud applications and provider-specific documentation, we propose to use an elaborated pattern format enabling…
The industry-driven evolution of cloud computing tends to obfuscate the common underlying architectural concepts of cloud offerings and their implications on hosted applications. Patterns are one way to document such architectural principles and to make good solutions to reoccurring (architectural) cloud challenges reusable. To capture cloud computing best practice from existing cloud applications and provider-specific documentation, we propose to use an elaborated pattern format enabling abstraction of concepts and reusability of knowledge in various use cases. We present a detailed step-by-step pattern identification process supported by a pattern authoring toolkit. We continuously apply this process to identify a large set of cloud patterns. In this paper, we introduce two new cloud patterns we identified in industrial scenarios recently. The approach aims at cloud architects, developers, and researchers alike to also apply this pattern identification process to create traceable and wellstructured
pieces of knowledge in their individual field of expertise. As entry point, we recap challenges introduced by cloud computing in various domainsAndere Autor:innenVeröffentlichung anzeigen -
Protecting SIP-Based Networks and Services from Unwanted Communications
GLOBECOM 2008
In recent times, SIP-based communication systems have become more and more popular (e.g., in open networks, NGN, IMS, etc.). With continuously dropping cost for the usage of such systems (e.g., VoIP, IM, IPTV), many researchers anticipate the amount of unsolicited communication within the network to reach an alarming high level in the near future. Thus, protection of such systems is needed to counter this threat. We present a holistic protection framework for SIP based infrastructures and…
In recent times, SIP-based communication systems have become more and more popular (e.g., in open networks, NGN, IMS, etc.). With continuously dropping cost for the usage of such systems (e.g., VoIP, IM, IPTV), many researchers anticipate the amount of unsolicited communication within the network to reach an alarming high level in the near future. Thus, protection of such systems is needed to counter this threat. We present a holistic protection framework for SIP based infrastructures and describe the most recent enhancements of the system.
Andere Autor:innenVeröffentlichung anzeigen -
Enabling high-speed and extensible real-time communications monitoring
Integrated Network Management 2009:
The use of the Internet as a medium for real-time communications has grown significantly over the past few years. However, the best-effort model of this network is not particularly well-suited to the demands of users who are familiar with the reliability, quality and security of the Public Switched Telephone Network. If the growth is to continue, monitoring and real time analysis of communication data will be needed in order to ensure good call quality, and should degradation occur, to take…
The use of the Internet as a medium for real-time communications has grown significantly over the past few years. However, the best-effort model of this network is not particularly well-suited to the demands of users who are familiar with the reliability, quality and security of the Public Switched Telephone Network. If the growth is to continue, monitoring and real time analysis of communication data will be needed in order to ensure good call quality, and should degradation occur, to take corrective action. Writing this type of monitoring application is difficult and time consuming: VoIP traffic not only tends to use dynamic ports, but its real-time nature, along with the fact that its packets tend to be small, impose non-trivial performance requirements. In this paper we present RTC-Mon, the Real-Time Communications Monitoring framework, which provides an extensible platform for the quick development of high-speed, real-time monitoring applications. While the focus is on VoIP traffic, the framework is general and is capable of monitoring any type of real-time communications traffic. We present testbed performance results for the various components of RTC-Mon, showing that it can monitor a large number of concurrent flows without losing packets. In addition, we implemented a proof-of-concept application that can not only track statistics about a large number of calls and their users, but that consists of only 800 lines of code, showing that the framework is efficient and that it also significantly reduces development time.
Andere Autor:innenVeröffentlichung anzeigen -
Detecting SPIT Calls by Checking Human Communication Patterns
ICC 2007
SPam over Internet Telephony (SPIT) is expected to become a very serious issue in the next years. The threat is going to spin out from the well known email spam problem by bot nets being re-programmed to initiate not just spam emails but also Voice over IP (VoIP) calls. Preventing SPIT is a new problem, because many well-established methods for blocking email spam cannot be applied. Currently, several SPIT prevention methods are being proposed but SPIT prevention research is still at a very…
SPam over Internet Telephony (SPIT) is expected to become a very serious issue in the next years. The threat is going to spin out from the well known email spam problem by bot nets being re-programmed to initiate not just spam emails but also Voice over IP (VoIP) calls. Preventing SPIT is a new problem, because many well-established methods for blocking email spam cannot be applied. Currently, several SPIT prevention methods are being proposed but SPIT prevention research is still at a very early stage. In this paper, we propose an innovative way to detect SPIT calls by comparing applying hidden Turing tests that compare them with typical human communication patterns. For passing these tests, significant resource consumptions at the SPIT generating bot nets would be required which contradicts the spammer's objective of placing as many SPIT calls as possible, The proposed method has several advantages compared to other methods that also interact with the caller. We validated its feasibility with a prototype implementation that we integrated into our modular VoIP security system called VoIP SEAL
Andere Autor:innen -
Holistic VoIP intrusion detection and prevention system
IPTComm 2007
VoIP security is crucial for current and future networks and services. The rapid shift from a closed and confined telephony towards an all IP network supporting end to end VoIP services provides major challenges to the security plane. Faced with multiple attack vectors, new and comprehensive defensive security solutions for VoIP must emerge from the research community.
This paper describes a multilayer intrusion detection and prevention system architecture for VoIP infrastructures. The…VoIP security is crucial for current and future networks and services. The rapid shift from a closed and confined telephony towards an all IP network supporting end to end VoIP services provides major challenges to the security plane. Faced with multiple attack vectors, new and comprehensive defensive security solutions for VoIP must emerge from the research community.
This paper describes a multilayer intrusion detection and prevention system architecture for VoIP infrastructures. The key components of the approach are based on a VoIP-specific honeypot and on an application layer event correlation engine. While each component alone can detect only a subset of VoIP-specific attacks, the two of them together can provide an effective defense for the many class of attacks. We show in this paper, how different and complementary conceptual approaches can jointly provide an in depth defense for VoIP architectures.Andere Autor:innen
Patente
-
Protection against unsolicited communication for internet protocol multimedia subsystem
Ausgestellt am DE 9407668
A protection against an unsolicited communication for an IMS (PUCI) system includes a call session control function (CSCF), and a plurality of PUCE application servers. The PUCI application servers make an evaluation as to whether a communication received from the user equipment is an unsolicited communication; the CSCF makes a decision on routing toward the PUCI application servers based on the evaluation; then, the PUCI application servers execute the routing based on the decision.
-
Protection against unsolicited communication for internet protocol multimedia subsystem
Ausgestellt am US 9225751
A PUCI system is designed to process an incoming call originated by the user equipment toward the counterpart user equipment via an EMS node having a PUCI-light functionality, which includes an IBCF/I-CSCF, a S-CSCF, and a database storing the PUCI-light information. Through a query to the database indicating a suspicious session in relation to the incoming call, the IMS node immediately blocks the suspicious session or simply marks the suspicious session for the further processing at a…
A PUCI system is designed to process an incoming call originated by the user equipment toward the counterpart user equipment via an EMS node having a PUCI-light functionality, which includes an IBCF/I-CSCF, a S-CSCF, and a database storing the PUCI-light information. Through a query to the database indicating a suspicious session in relation to the incoming call, the IMS node immediately blocks the suspicious session or simply marks the suspicious session for the further processing at a subsequent node. The reason for rejection is included in a SIP BYE/ERROR message of an original session setup message, which is interpreted by a previous IMS node so as to obtain the relevant information from a SIP header. The relevant information is stored in either a global operator policy database or a local database, thus enabling a PUCI-negating IMS node to reject an unsolicited call related to the blocked session.
-
Communication system and processing method
Ausgestellt am US 8406396
A communication system shares terminal identification information (TII) used for identifying a terminal that sends a spam phone call, with another communication system belonging to another network provider, and includes: a storage section that stores the TII of a terminal that sends a spam phone call; a transmission section that transmits the TII stored in the storage section to the other communication system; a reception section that receives the TII used for identifying the terminal that…
A communication system shares terminal identification information (TII) used for identifying a terminal that sends a spam phone call, with another communication system belonging to another network provider, and includes: a storage section that stores the TII of a terminal that sends a spam phone call; a transmission section that transmits the TII stored in the storage section to the other communication system; a reception section that receives the TII used for identifying the terminal that sends the spam phone call; a registration section that registers the TII received by the reception section in the storage section; and a spam phone call determination section that determines whether there is a match between terminal information indicating information of an outgoing call terminal that sends a connection request, and the TII stored in the storage section, thereby determining whether the outgoing call terminal sends a spam phone call.
-
Method for detecting attacks to multimedia systems and multimedia system with attack detection functionality
Ausgestellt am US 9032515
A method for detecting attacks to multimedia systems, wherein a communication path (1) is established within the multimedia system by a multimedia communication flow between a communication source and a communication destination, is characterized in that at least two devices (3, 4, 8) are provided along the communication path (1), each the device (3, 4, 8) acting as inspection device (2) that is enabled to inspect the multimedia communication flow that transits the inspection device (2), and…
A method for detecting attacks to multimedia systems, wherein a communication path (1) is established within the multimedia system by a multimedia communication flow between a communication source and a communication destination, is characterized in that at least two devices (3, 4, 8) are provided along the communication path (1), each the device (3, 4, 8) acting as inspection device (2) that is enabled to inspect the multimedia communication flow that transits the inspection device (2), and that the results of the single inspections are accumulated along the communication path (1). Furthermore, a multimedia system with attack detection functionality is described.
-
Malicious call detection apparatus, malicious call detecting method and computer program for detecting malicious calls
Ausgestellt am US 9338196
To improve detection accuracy of SPIT, first, an identification information gathering apparatus receives various identification information from an IP phone terminal which has transmitted an INVITE message. A PUCI server generates bind identification information by binding or associating various identification information received from an identification information gathering apparatus via an SIP server and registers the bind identification information to a gray list stored in a list storing…
To improve detection accuracy of SPIT, first, an identification information gathering apparatus receives various identification information from an IP phone terminal which has transmitted an INVITE message. A PUCI server generates bind identification information by binding or associating various identification information received from an identification information gathering apparatus via an SIP server and registers the bind identification information to a gray list stored in a list storing portion. A SPIT determination portion evaluates the bind identification information in reference to the gray list and determines whether or not the session start request from the IP phone terminal is allowed.
-
Malicious call detection apparatus, malicious call detecting method and computer program for detecting malicious calls
Ausgestellt am US 9338196
To improve detection accuracy of SPIT, first, an identification information gathering apparatus receives various identification information from an IP phone terminal which has transmitted an INVITE message. A PUCI server generates bind identification information by binding or associating various identification information received from an identification information gathering apparatus via an SIP server and registers the bind identification information to a gray list stored in a list storing…
To improve detection accuracy of SPIT, first, an identification information gathering apparatus receives various identification information from an IP phone terminal which has transmitted an INVITE message. A PUCI server generates bind identification information by binding or associating various identification information received from an identification information gathering apparatus via an SIP server and registers the bind identification information to a gray list stored in a list storing portion. A SPIT determination portion evaluates the bind identification information in reference to the gray list and determines whether or not the session start request from the IP phone terminal is allowed.
-
Malicious call detection apparatus, malicious call detecting method and computer program for detecting malicious calls
Ausgestellt am US 9338196
To improve detection accuracy of SPIT, first, an identification information gathering apparatus receives various identification information from an IP phone terminal which has transmitted an INVITE message. A PUCI server generates bind identification information by binding or associating various identification information received from an identification information gathering apparatus via an SIP server and registers the bind identification information to a gray list stored in a list storing…
To improve detection accuracy of SPIT, first, an identification information gathering apparatus receives various identification information from an IP phone terminal which has transmitted an INVITE message. A PUCI server generates bind identification information by binding or associating various identification information received from an identification information gathering apparatus via an SIP server and registers the bind identification information to a gray list stored in a list storing portion. A SPIT determination portion evaluates the bind identification information in reference to the gray list and determines whether or not the session start request from the IP phone terminal is allowed.
-
Protection against unsolicited communication for internet protocol multimedia subsystem
Ausgestellt am US 9225751
A PUCI system is designed to process an incoming call originated by the user equipment toward the counterpart user equipment via an EMS node having a PUCI-light functionality, which includes an IBCF/I-CSCF, a S-CSCF, and a database storing the PUCI-light information. Through a query to the database indicating a suspicious session in relation to the incoming call, the IMS node immediately blocks the suspicious session or simply marks the suspicious session for the further processing at a…
A PUCI system is designed to process an incoming call originated by the user equipment toward the counterpart user equipment via an EMS node having a PUCI-light functionality, which includes an IBCF/I-CSCF, a S-CSCF, and a database storing the PUCI-light information. Through a query to the database indicating a suspicious session in relation to the incoming call, the IMS node immediately blocks the suspicious session or simply marks the suspicious session for the further processing at a subsequent node. The reason for rejection is included in a SIP BYE/ERROR message of an original session setup message, which is interpreted by a previous IMS node so as to obtain the relevant information from a SIP header. The relevant information is stored in either a global operator policy database or a local database, thus enabling a PUCI-negating IMS node to reject an unsolicited call related to the blocked session.
-
PROTECTION AGAINST UNSOLICITED COMMUNICATION FOR INTERNET PROTOCOL MULTIMEDIA SUBSYSTEM
Ausgestellt am US 20110265145A1
A PUCI system includes a user equipment (UE) and a PUCI application server holding user policies in connection to a home subscriber server (HSS) holding operator policies. A policy manager establishes the correlation between the user policies and the operator policies, thus determining whether to reject or forward an incoming call originated from a trusted/distrusted source network in accordance with prescribed rules/logics.
-
Method for detecting attacks to multimedia systems and multimedia system with attack detection functionality
Ausgestellt am US 9032515
A method for detecting attacks to multimedia systems, wherein a communication path (1) is established within the multimedia system by a multimedia communication flow between a communication source and a communication destination, is characterized in that at least two devices (3, 4, 8) are provided along the communication path (1), each the device (3, 4, 8) acting as inspection device (2) that is enabled to inspect the multimedia communication flow that transits the inspection device (2), and…
A method for detecting attacks to multimedia systems, wherein a communication path (1) is established within the multimedia system by a multimedia communication flow between a communication source and a communication destination, is characterized in that at least two devices (3, 4, 8) are provided along the communication path (1), each the device (3, 4, 8) acting as inspection device (2) that is enabled to inspect the multimedia communication flow that transits the inspection device (2), and that the results of the single inspections are accumulated along the communication path (1). Furthermore, a multimedia system with attack detection functionality is described.
Projekte
-
Consultant Car Communication
–
Consult the DLR for building a simulation environment to measure in real time system critical car communication
-
VoIP for the Uni
–
MARKET TEAM organisiert mit Siemens mobile, dem Zentrum für Datenverarbeitung (ZDV) sowie dem Lehrstuhl für Rechnernetze und Internet ein Studentenprojekt zur Nutzung von Voice over IP im Universitätsnetz.
Anhand einer Beispielimplementierung soll gezeigt werden, wie das vorhandene WLAN-Kommunikationsnetz umgebaut oder erweitert werden kann, um Internettelefonie uniweit anbieten zu können.Andere Mitarbeiter:innen -
Telepresence Admin
–
Planning, Integration and management of Telepresence solution for teaching and commercial organizations
-
Web Developer
–
Development of websites (HTLM, CSS, PHP, etc.) for smal organizations
Auszeichnungen/Preise
-
Technology Solution EXCELLENCE Award 2021
Microsoft Germany
Co-founder of of one of the biggest projects we ever had in Germany, adressing culture, people and technology! Result was a strategic alliance agreement dealing with transformation projects from sales, product developemt, IT as well as HR and finance. Thilo was here driving the vision and defined the mission of it within our team.
-
Great People, Great Performance award for extraordinary delivery
Microsoft
Achieving th eteam Award for tranfsorming an chemcial Company with >100.000 employees to adapt new cloud workloads. My personal contribution was the Orchestration of the organisational Change within this project
-
Freshman of the year
NEC Corporation Japan
Reward for extraordinary results in the area of standardization
-
Vice-Chair of ETSI TISPAN Security WorkingGroup
ETSI TISPAN
Youngest Vice-chair and Rapporteur in the history of ETSI
Sprachen
-
German
Muttersprache oder zweisprachig
-
English
Verhandlungssicher
-
French
Gute Kenntnisse
Erhaltene Empfehlungen
1 Person hat Thilo Ewald empfohlen
Jetzt anmelden und ansehenWeitere Aktivitäten von Thilo Ewald
-
By 2045 We Will Have a full Mobile Telco from Space By 2045, we will operate a full telco from space: RAN, transport, and core running entirely in…
By 2045 We Will Have a full Mobile Telco from Space By 2045, we will operate a full telco from space: RAN, transport, and core running entirely in…
Beliebt bei Thilo Ewald
-
Telcos died at age 145 "The global Telecommunications Industry, born in 1876, passed away in July 2045 after a long and preventable decline. It will…
Telcos died at age 145 "The global Telecommunications Industry, born in 1876, passed away in July 2045 after a long and preventable decline. It will…
Beliebt bei Thilo Ewald
-
Almost two full decades into my career with Capgemini, a trip to Paris remains as exciting and rewarding as ever. I still recall my first trip to…
Almost two full decades into my career with Capgemini, a trip to Paris remains as exciting and rewarding as ever. I still recall my first trip to…
Beliebt bei Thilo Ewald
-
🎉 It's a wrap for #DTW25! 🎉 Our team had yet another incredible year at TM Forum #DTWIgnite, meeting and exchanging ideas with many clients…
🎉 It's a wrap for #DTW25! 🎉 Our team had yet another incredible year at TM Forum #DTWIgnite, meeting and exchanging ideas with many clients…
Beliebt bei Thilo Ewald
-
🎉 30 Jahre Deutsche Telekom! 🎉 500 Gäste, klassische und moderne Musik, Sport, Politik, zwei Flügel (in Bonn und Hamburg), die sich zu einem Stück…
🎉 30 Jahre Deutsche Telekom! 🎉 500 Gäste, klassische und moderne Musik, Sport, Politik, zwei Flügel (in Bonn und Hamburg), die sich zu einem Stück…
Beliebt bei Thilo Ewald
-
𝗧𝗿𝗮𝗻𝘀𝗳𝗼𝗿𝗺𝗶𝗻𝗴 𝗧𝗲𝗹𝗰𝗼: 𝗨𝗻𝗹𝗲𝗮𝘀𝗵 𝘁𝗵𝗲 𝗣𝗼𝘄𝗲𝗿 𝗼𝗳 𝗗𝗶𝗴𝗶𝘁𝗮𝗹 𝗪𝗼𝗿𝗸𝗳𝗼𝗿𝗰𝗲 🚀 Unlock the future of telecom! Join…
𝗧𝗿𝗮𝗻𝘀𝗳𝗼𝗿𝗺𝗶𝗻𝗴 𝗧𝗲𝗹𝗰𝗼: 𝗨𝗻𝗹𝗲𝗮𝘀𝗵 𝘁𝗵𝗲 𝗣𝗼𝘄𝗲𝗿 𝗼𝗳 𝗗𝗶𝗴𝗶𝘁𝗮𝗹 𝗪𝗼𝗿𝗸𝗳𝗼𝗿𝗰𝗲 🚀 Unlock the future of telecom! Join…
Beliebt bei Thilo Ewald
-
This DSP Leaders World Forum panel discussion dives into the business case for network APIs and what telcos must do to move beyond exposure toward…
This DSP Leaders World Forum panel discussion dives into the business case for network APIs and what telcos must do to move beyond exposure toward…
Beliebt bei Thilo Ewald
-
This morning, we announced that Capgemini has entered into an agreement to acquire WNS to create a global leader in Agentic AI-powered Intelligent…
This morning, we announced that Capgemini has entered into an agreement to acquire WNS to create a global leader in Agentic AI-powered Intelligent…
Beliebt bei Thilo Ewald
-
🌍 In the Eye of the Hurricane In a world shaped by geopolitical tensions, pandemics, and digital disruption, Arash Ashouriha made one point clear:…
🌍 In the Eye of the Hurricane In a world shaped by geopolitical tensions, pandemics, and digital disruption, Arash Ashouriha made one point clear:…
Beliebt bei Thilo Ewald
-
We're excited to be part of this year's Deutsche Telekom Campus Fair. Visit us to experience the latest innovations firsthand and connect with our…
We're excited to be part of this year's Deutsche Telekom Campus Fair. Visit us to experience the latest innovations firsthand and connect with our…
Beliebt bei Thilo Ewald
-
✈️ First time presenting cloud sovereignty — in a plane! Yesterday at the TechRiders Conference in Cologne, I had the unique opportunity to speak…
✈️ First time presenting cloud sovereignty — in a plane! Yesterday at the TechRiders Conference in Cologne, I had the unique opportunity to speak…
Beliebt bei Thilo Ewald
-
Thank you #DeutscheTelekom for the next great Campus Fair #2025. As #Capgemini we are proud to participate! Thank you to Board Member T&I Claudia…
Thank you #DeutscheTelekom for the next great Campus Fair #2025. As #Capgemini we are proud to participate! Thank you to Board Member T&I Claudia…
Beliebt bei Thilo Ewald
-
I had the pleasure of joining a thought-provoking panel discussion yesterday at the Telekom Campus Fair 2025 in Bonn, where we explored the future of…
I had the pleasure of joining a thought-provoking panel discussion yesterday at the Telekom Campus Fair 2025 in Bonn, where we explored the future of…
Geteilt von Thilo Ewald