Revisiting anomaly-based network intrusion detection systems door