For example the most common method is to list the connected devices by MAC address. Since I can change that to an authorized MAC address you would be none the wiser.
It appears you are starting your research and only listed the IP/DHCP angle but not the MAC address. There are tomes about that so I won't duplicate that here. HOWEVER you should look at your router/etc. and see if you can limit connections by MAC addresses. If you want to hamper them from carrying in any old thing, only allow those MAC addresses.
Bob
Hi,
I am looking for a way to find unauthorized devices on my network. Let's say an employee brings in their personal laptop and connects to my network via CAT5, and they use a static IP Address, and have their Windows firewall turned on.
With a static IP, this laptop will not show up in DHCP
With the firewall turned on, this laptop will not return a ping
This is my dilemma. How can I know if someone is doing this?
Thoughts?
Thanks.

Chowhound
Comic Vine
GameFAQs
GameSpot
Giant Bomb
TechRepublic