Revisiting anomaly-based network intrusion detection systems by