Which algorithm can detect unknown attacks? Comparison of...
Consequently, it should not use the information on the IP for training: it describes a very specific setup of the system used to generate the dataset and does not provide useful information on the system behavio