Why Anomaly Based Intrusion Detection Systems Are A Hackers Best Friend