1.HIDS/IPS

2.Root Kit Analysis

3.Authentication checks

4.Behavioural detection

5.Av