A Signal Theory Model for Security Monitoring using CheckMK
A Signal Theory Model for Security Monitoring using CheckMK
Author(s): Iliuță-Alexandru IONEL
Subject(s): Politics / Political Sciences, Politics, Economy, Security and defense, ICT Information and Communications Technologies
Published by: Asociatia Romana pentru Asigurarea Securitatii Informatiei
Keywords: Brute force; Monitoring; Security; Signal; SSH;
Summary/Abstract: Continuous monitoring of intelligent systems is used to analyze data and text from various sources. They usually monitor things such as risk, controls, opportunities, competition, and other concerns. While there exists literature that provides information on the capabilities of this kind of system, there has been a limited theoretical development in this field. The information sources monitored by these systems provide signals related to events, activities, or issues. However, selecting the appropriate information sources is not a simple task, because it is influenced by factors such as time, cost, redundancy, reliability, or weak signals. Furthermore, for the monitored signals, it is recommended to generate some analytics to study the flow and have a traceability of the issue we are dealing with. In this paper, a signal theory model is introduced and applied to address some of these issues regarding the SSH brute-force attacks. I will use a tool called CheckMK and its capabilities to implement a signal theory model used for monitoring security of a system.
Book: Proceedings of the International Conference on Cybersecurity and Cybercrime - 2023
- Page Range: 141-148
- Page Count: 8
- Publication Year: 2023
- Language: English
- Content File-PDF