What is Malicious Activity Detection? Key Techniques and Best Practices