The document discusses two types of detection methods: rule-based detection and statistical anomaly detection. Rule-based detection uses predefined rules to identify intruder behavior, while statistical anomaly detection analyzes legitimate user behavior over time and applies statistical tests to identify deviations. Both approaches include sub-methods such as anomaly detection, penetration identification, threshold detection, and profile-based detection.