A Signal Theory Model for Security Monitoring using CheckMK

Brute force, Monitoring, Security, Signal, SSH

Authors

  • Iliuță-Alexandru IONEL
    iliuta.ionel@stud.etti.upb.ro (Primary Contact)
    Faculty of Electronics, Telecommunications, and Information Technology, University POLITEHNICA of Bucharest, Romania
2023-05-30

Downloads

Continuous monitoring of intelligent systems is used to analyze data and text from various sources. They usually monitor things such as risk, controls, opportunities, competition, and other concerns. While there exists literature that provides information on the capabilities of this kind of system, there has been a limited theoretical development in this field. The information sources monitored by these systems provide signals related to events, activities, or issues. However, selecting the appropriate information sources is not a simple task, because it is influenced by factors such as time, cost, redundancy, reliability, or weak signals. Furthermore, for the monitored signals, it is recommended to generate some analytics to study the flow and have a traceability of the issue we are dealing with. In this paper, a signal theory model is introduced and applied to address some of these issues regarding the SSH brute-force attacks. I will use a tool called CheckMK and its capabilities to implement a signal theory model used for monitoring security of a system.