A practical guide to detecting SSH brute force, SUID abuse, persistence, and exfiltration using Splunk, auditd, and custom SPL queries