Intrusion detection systems are used to detect all of the following except:
Physical break-ins
System misuse
Unauthorized changes to system files
SPAM