Misuse detection discovers intrusion activity in system by detecting similar behaviors of user intrusions, or by detecting violations of system security rules indirectly by exploiting system flaws.
Which of the following is not misuse detection feature?
A . Easy to implement
B . Accurate detection
C . Effective detection of impersonation of legitimate users
D . Easy to upgrade
Answer: C