Identity Under Attack: Detection Strategies That Work