• Use IDS (Intrusion Detection Techniques) ¨Cchkrootkit ¨CTripwire ¨CAIDE (Advanced Intrusion Detection Environment) ¨CFcheck • Usage of an integrity checker • Snort