Outline an anomaly detection strategy