Benchmarks for Evaluating Anomaly-Based Intrusion Detection Solutions