Intrusion Detecton Systems (IDS) are designed to monitor network traffic and identify thrests that have breached the networks' initial defences. IDS identify all of the following except:
a) An attacker who is trying to break into the credentials of a legitimate user in order to gain access to IS, device, or network, b) A legitimate user who performs actions he is not authorized to do, c) A user who tries to disguise or cover up his actions by deleting audit files or system logs, d) Employees who use computing or network resources dinefficiently